Vulnerability Details : CVE-2014-0732
The Real Time Monitoring Tool (RTMT) web application in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read application files via a direct request to a URL, aka Bug ID CSCum46495.
Vulnerability category: BypassGain privilege
Threat overview for CVE-2014-0732
Top countries where our scanners detected CVE-2014-0732
Top open port discovered on systems with this issue
22
IPs affected by CVE-2014-0732 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-0732!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-0732
Probability of exploitation activity in the next 30 days: 0.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 63 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0732
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-0732
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0732
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=32913
Cisco Unified Communications Manager Real Time Monitoring Tool Information Disclosure VulnerabilityVendor Advisory
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0732
Cisco Unified Communications Manager Real Time Monitoring Tool Information Disclosure VulnerabilityVendor Advisory
Products affected by CVE-2014-0732
- cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:3.3\(5\)sr1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:3.3\(5\)sr2a:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:3.3\(5\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*