CVE-2012-0366 (CNNVD-201202-523)

CRITICAL
中文标题:
Cisco Unity Connection权限许可和访问控制漏洞
英文标题:
Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administra...
CVSS分数: 9.0
发布时间: 2012-03-01 01:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Unity Connection是运行在Linux-based Cisco Unified Communications操作系统上的功能强大的语音消息通讯平台。 Cisco Unity Connection 7.1.3b(Su2)之前版本中存在漏洞。远程认证用户可利用该漏洞通过Help Desk Administrator角色改变管理员密码,也称Bug ID CSCtd45141。

英文描述:

Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administrative password by leveraging the Help Desk Administrator role, aka Bug ID CSCtd45141.

CWE类型:
CWE-264
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco unity_connection * - - cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*
cisco unity_connection 1.1 - - cpe:2.3:a:cisco:unity_connection:1.1:*:*:*:*:*:*:*
cisco unity_connection 1.1\(1\) - - cpe:2.3:a:cisco:unity_connection:1.1\(1\):*:*:*:*:*:*:*
cisco unity_connection 1.1\(1\)_es1 - - cpe:2.3:a:cisco:unity_connection:1.1\(1\)_es1:*:*:*:*:*:*:*
cisco unity_connection 1.1\(1\)_es12 - - cpe:2.3:a:cisco:unity_connection:1.1\(1\)_es12:*:*:*:*:*:*:*
cisco unity_connection 1.1\(1\)_sr1 - - cpe:2.3:a:cisco:unity_connection:1.1\(1\)_sr1:*:*:*:*:*:*:*
cisco unity_connection 1.2 - - cpe:2.3:a:cisco:unity_connection:1.2:*:*:*:*:*:*:*
cisco unity_connection 1.2\(1\) - - cpe:2.3:a:cisco:unity_connection:1.2\(1\):*:*:*:*:*:*:*
cisco unity_connection 1.2\(1\)_es65 - - cpe:2.3:a:cisco:unity_connection:1.2\(1\)_es65:*:*:*:*:*:*:*
cisco unity_connection 1.2\(1\)sr2 - - cpe:2.3:a:cisco:unity_connection:1.2\(1\)sr2:*:*:*:*:*:*:*
cisco unity_connection 2.0 - - cpe:2.3:a:cisco:unity_connection:2.0:*:*:*:*:*:*:*
cisco unity_connection 2.0\(1\) - - cpe:2.3:a:cisco:unity_connection:2.0\(1\):*:*:*:*:*:*:*
cisco unity_connection 2.1 - - cpe:2.3:a:cisco:unity_connection:2.1:*:*:*:*:*:*:*
cisco unity_connection 2.1\(1\) - - cpe:2.3:a:cisco:unity_connection:2.1\(1\):*:*:*:*:*:*:*
cisco unity_connection 2.1\(2\) - - cpe:2.3:a:cisco:unity_connection:2.1\(2\):*:*:*:*:*:*:*
cisco unity_connection 2.1\(3\) - - cpe:2.3:a:cisco:unity_connection:2.1\(3\):*:*:*:*:*:*:*
cisco unity_connection 2.1\(3b\)su1 - - cpe:2.3:a:cisco:unity_connection:2.1\(3b\)su1:*:*:*:*:*:*:*
cisco unity_connection 2.1\(4\) - - cpe:2.3:a:cisco:unity_connection:2.1\(4\):*:*:*:*:*:*:*
cisco unity_connection 2.1\(4\)su1 - - cpe:2.3:a:cisco:unity_connection:2.1\(4\)su1:*:*:*:*:*:*:*
cisco unity_connection 2.1\(4a\) - - cpe:2.3:a:cisco:unity_connection:2.1\(4a\):*:*:*:*:*:*:*
cisco unity_connection 2.1\(4a\)su2 - - cpe:2.3:a:cisco:unity_connection:2.1\(4a\)su2:*:*:*:*:*:*:*
cisco unity_connection 2.1\(5\) - - cpe:2.3:a:cisco:unity_connection:2.1\(5\):*:*:*:*:*:*:*
cisco unity_connection 2.1\(5\)su1 - - cpe:2.3:a:cisco:unity_connection:2.1\(5\)su1:*:*:*:*:*:*:*
cisco unity_connection 2.1\(5\)su2 - - cpe:2.3:a:cisco:unity_connection:2.1\(5\)su2:*:*:*:*:*:*:*
cisco unity_connection 2.1\(5\)su3 - - cpe:2.3:a:cisco:unity_connection:2.1\(5\)su3:*:*:*:*:*:*:*
cisco unity_connection 6.1\(3b\)su1 - - cpe:2.3:a:cisco:unity_connection:6.1\(3b\)su1:*:*:*:*:*:*:*
cisco unity_connection 7.0 - - cpe:2.3:a:cisco:unity_connection:7.0:*:*:*:*:*:*:*
cisco unity_connection 7.0\(2\) - - cpe:2.3:a:cisco:unity_connection:7.0\(2\):*:*:*:*:*:*:*
cisco unity_connection 7.0\(2a\)su2 - - cpe:2.3:a:cisco:unity_connection:7.0\(2a\)su2:*:*:*:*:*:*:*
cisco unity_connection 7.0\(2a\)su3 - - cpe:2.3:a:cisco:unity_connection:7.0\(2a\)su3:*:*:*:*:*:*:*
cisco unity_connection 7.1 - - cpe:2.3:a:cisco:unity_connection:7.1:*:*:*:*:*:*:*
cisco unity_connection 7.1\(2\) - - cpe:2.3:a:cisco:unity_connection:7.1\(2\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(2a\) - - cpe:2.3:a:cisco:unity_connection:7.1\(2a\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(2a\)su1 - - cpe:2.3:a:cisco:unity_connection:7.1\(2a\)su1:*:*:*:*:*:*:*
cisco unity_connection 7.1\(2b\) - - cpe:2.3:a:cisco:unity_connection:7.1\(2b\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(2b\)su1 - - cpe:2.3:a:cisco:unity_connection:7.1\(2b\)su1:*:*:*:*:*:*:*
cisco unity_connection 7.1\(3\) - - cpe:2.3:a:cisco:unity_connection:7.1\(3\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(3a\) - - cpe:2.3:a:cisco:unity_connection:7.1\(3a\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(3a\)su1 - - cpe:2.3:a:cisco:unity_connection:7.1\(3a\)su1:*:*:*:*:*:*:*
cisco unity_connection 7.1\(3a\)su1a - - cpe:2.3:a:cisco:unity_connection:7.1\(3a\)su1a:*:*:*:*:*:*:*
cisco unity_connection 7.1\(3b\) - - cpe:2.3:a:cisco:unity_connection:7.1\(3b\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(5\) - - cpe:2.3:a:cisco:unity_connection:7.1\(5\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(5\)su1a - - cpe:2.3:a:cisco:unity_connection:7.1\(5\)su1a:*:*:*:*:*:*:*
cisco unity_connection 7.1\(5a\) - - cpe:2.3:a:cisco:unity_connection:7.1\(5a\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(5b\) - - cpe:2.3:a:cisco:unity_connection:7.1\(5b\):*:*:*:*:*:*:*
cisco unity_connection 7.1\(5b\)su2 - - cpe:2.3:a:cisco:unity_connection:7.1\(5b\)su2:*:*:*:*:*:*:*
cisco unity_connection 7.1\(5b\)su3 - - cpe:2.3:a:cisco:unity_connection:7.1\(5b\)su3:*:*:*:*:*:*:*
cisco unity_connection 7.1\(5b\)su4 - - cpe:2.3:a:cisco:unity_connection:7.1\(5b\)su4:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20120229 Multiple Vulnerabilities in Cisco Unity Connection vendor-advisory
cve.org
访问
CVSS评分详情
9.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2012-03-01 01:00:00
修改时间:
2024-09-16 19:46:51
创建时间:
2025-11-11 15:33:20
更新时间:
2025-11-11 15:50:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2012-0366 2025-11-11 15:18:26 2025-11-11 07:33:20
NVD nvd_CVE-2012-0366 2025-11-11 14:53:56 2025-11-11 07:42:09
CNNVD cnnvd_CNNVD-201202-523 2025-11-11 15:09:14 2025-11-11 07:50:02
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:50:02
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201202-523; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201202-523
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:09
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:S/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 48; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:S/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 48
  • data_sources: ['cve'] -> ['cve', 'nvd']