CVE-2018-15448

Published: Nov 08, 2018 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2018-7326 Aliases: GSD-2018-15448
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,3
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
MEDIUM 5,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

A vulnerability in the user management functions of Cisco Registered Envelope Service could allow an unauthenticated, remote attacker to discover sensitive user information. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to an insecure configuration that allows improper indexing. An attacker could exploit this vulnerability by using a search engine to look for specific data strings. A successful exploit could allow the attacker to discover certain sensitive information about the application, including usernames.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0122
Percentile
0,8th
Updated

EPSS Score Trend (Last 90 Days)

Application

Registered Envelope Service by Cisco

cpe:2.3:a:cisco:registered_envelope_service:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
http://www.securityfocus.com/bid/105862
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105862
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
http://www.securityfocus.com/bid/105862
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105862