发布时间 :2002-10-28 00:00:00
修订时间 :2017-07-10 21:29:13

[原文]Cisco Unity 2.x and 3.x uses well-known default user accounts, which could allow remote attackers to gain access and place arbitrary calls.

[CNNVD]Cisco Unity使用公认默认用户账户漏洞(CNNVD-200210-300)

        Cisco Unity 2.x版本和3.x版本使用公认默认用户账户,远程攻击者可以获得使用权以及放置任意调用。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/h:cisco:unity_server:2.4Cisco Unity Server 2.4
cpe:/h:cisco:unity_server:2.1Cisco Unity Server 2.1
cpe:/h:cisco:unity_server:3.0Cisco Unity Server 3.0
cpe:/h:cisco:unity_server:2.2Cisco Unity Server 2.2
cpe:/h:cisco:unity_server:3.1Cisco Unity Server 3.1
cpe:/h:cisco:unity_server:2.0Cisco Unity Server 2.0
cpe:/h:cisco:unity_server:2.3Cisco Unity Server 2.3
cpe:/h:cisco:unity_server:2.46Cisco Unity Server 2.46

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  CISCO  20021004 Predefined Restriction Tables Allow Calls to International Operator
(VENDOR_ADVISORY)  XF  cisco-unity-insecure-configuration(10282)
(UNKNOWN)  XF  cisco-unity-example-default-account(44545)

- 漏洞信息

Cisco Unity使用公认默认用户账户漏洞
高危 未知
2002-10-28 00:00:00 2005-10-20 00:00:00
        Cisco Unity 2.x版本和3.x版本使用公认默认用户账户,远程攻击者可以获得使用权以及放置任意调用。

- 公告与补丁


- 漏洞信息

Cisco Unity Arbitrary International Operator Calls
Remote / Network Access Authentication Management
Loss of Integrity
Exploit Public

- 漏洞描述

Cisco Unity contains a flaw that may allow a remote attacker to arbitrary place international calls. The issue is triggered due to the default configuration in the predefined restriction tables, which does not block calls to the international operator. It is possible that the flaw may allow a remote attacker to arbitrary configure call forwardings to the international operator or other restricted numbers, resulting in a loss of integrity.

- 时间线

2002-10-04 2001-01-01
2002-10-04 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Add additional dial strings to the restriction tables to prevent the application from trying to place a toll call.

- 相关参考

- 漏洞作者

Unknown or Incomplete