Assigner | cisco |
Reserved | 2023-11-08 |
Published | 2024-04-03 |
Updated | 2024-04-03 |
Description
A vulnerability in Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a directory traversal attack, which could allow the attacker to perform arbitrary actions on an affected device. This vulnerability is due to insufficient protections for the web UI of an affected system. An attacker could exploit this vulnerability by sending crafted requests to the web UI. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user, such as accessing password or log files or uploading and deleting existing files from the system.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
Problem types
Product status
10.5(1)
11.5(4)SU2
11.5(4)SU4
11.5(4)SU3
11.5(1)
11.5(3)
11.5(2)
11.5(4a)
11.5(4)
11.5(2a)
11.5(4)SU10
11.5(4)SU9
11.5(4)SU11
12.5(1)
12.5(1)SU2
12.5(1)SU3
12.5(1)SU1
12.5(1a)
12.5(1)SU4
12.5(1)SU5
12.5(1)SU6
12.5(1)SU7
12.5(1)SU8
12.5(1)SU8a
12.5(1)SU8b
12.0(1) SU2
12.0(1) SU1
12.0(1)
10.0.2
10.0(1)
11.0(1)
14SU1
14SU2
14
References
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cem-csrf-suCmNjFr (cisco-sa-cem-csrf-suCmNjFr)