CVE-2017-12337

Published: Nov 16, 2017 Last Modified: Lug 31, 2025
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 10,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote attacker to gain unauthorized, elevated access to an affected device. The vulnerability occurs when a refresh upgrade (RU) or Prime Collaboration Deployment (PCD) migration is performed on an affected device. When a refresh upgrade or PCD migration is completed successfully, an engineering flag remains enabled and could allow root access to the device with a known password. If the vulnerable device is subsequently upgraded using the standard upgrade method to an Engineering Special Release, service update, or a new major release of the affected product, this vulnerability is remediated by that action. Note: Engineering Special Releases that are installed as COP files, as opposed to the standard upgrade method, do not remediate this vulnerability. An attacker who can access an affected device over SFTP while it is in a vulnerable state could gain root access to the device. This access could allow the attacker to compromise the affected system completely. Cisco Bug IDs: CSCvg22923, CSCvg55112, CSCvg55128, CSCvg55145, CSCvg58619, CSCvg64453, CSCvg64456, CSCvg64464, CSCvg64475, CSCvg68797.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,1319
Percentile
0,9th
Updated

EPSS Score Trend (Last 90 Days)

287

Improper Authentication

Draft
Common Consequences
Security Scopes Affected:
Integrity Confidentiality Availability Access Control
Potential Impacts:
Read Application Data Gain Privileges Or Assume Identity Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: ICS/OT, Not Technology-Specific, Web Based
View CWE Details
Application

Unity Connection by Cisco

cpe:2.3:a:cisco:unity_connection:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Unified Communications Manager Im And Presence Service by Cisco

cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Unified Intelligence Center by Cisco

cpe:2.3:a:cisco:unified_intelligence_center:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Unified Communications Manager by Cisco

cpe:2.3:a:cisco:unified_communications_manager:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Unified Contact Center Express by Cisco

cpe:2.3:a:cisco:unified_contact_center_express:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Socialminer by Cisco

cpe:2.3:a:cisco:socialminer:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Prime License Manager by Cisco

cpe:2.3:a:cisco:prime_license_manager:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Unified Communications Manager by Cisco

cpe:2.3:a:cisco:unified_communications_manager:-:*:*:*:session_management:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Finesse by Cisco

cpe:2.3:a:cisco:finesse:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Mediasense by Cisco

cpe:2.3:a:cisco:mediasense:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Emergency Responder by Cisco

cpe:2.3:a:cisco:emergency_responder:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Hosted Collaboration Solution by Cisco

cpe:2.3:a:cisco:hosted_collaboration_solution:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
http://www.securityfocus.com/bid/101865
http://www.securitytracker.com/id/1039813
http://www.securitytracker.com/id/1039814
http://www.securitytracker.com/id/1039815
http://www.securitytracker.com/id/1039816
http://www.securitytracker.com/id/1039817
http://www.securitytracker.com/id/1039818
http://www.securitytracker.com/id/1039819
http://www.securitytracker.com/id/1039820
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
http://www.securityfocus.com/bid/101865
http://www.securitytracker.com/id/1039813
http://www.securitytracker.com/id/1039814
http://www.securitytracker.com/id/1039815
http://www.securitytracker.com/id/1039816
http://www.securitytracker.com/id/1039817
http://www.securitytracker.com/id/1039818
http://www.securitytracker.com/id/1039819
http://www.securitytracker.com/id/1039820