Cisco Unified Contact Center Express 10.0(1) CCMConfig Page access control

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.8 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Cisco Unified Contact Center Express 10.0(1). The impacted element is an unknown function of the component CCMConfig Page. Executing a manipulation can lead to access control. This vulnerability appears as CVE-2014-2102. There is no available exploit. You should upgrade the affected component.
Details
A vulnerability classified as problematic was found in Cisco Unified Contact Center Express 10.0(1). This vulnerability affects some unknown functionality of the component CCMConfig Page. The manipulation with an unknown input leads to a access control vulnerability. The CWE definition for the vulnerability is CWE-264. As an impact it is known to affect confidentiality. CVE summarizes:
Cisco Unified Contact Center Express (Unified CCX) does not properly restrict the content of the CCMConfig page, which allows remote authenticated users to obtain sensitive information by examining this content, aka Bug ID CSCum95575.
The weakness was presented 02/25/2014 with Cisco as Cisco Unified Contact Center Express CCMConfig Sensitive Information Disclosure Vulnerability as confirmed advisory (Website). The advisory is shared for download at tools.cisco.com. The public release was coordinated in cooperation with the vendor. This vulnerability was named CVE-2014-2102 since 02/25/2014. The exploitation appears to be easy. The attack can be initiated remotely. A single authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1068.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (91433) and SecurityFocus (BID 65797†). See VDB-12449 and VDB-12447 for similar entries. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 3.8
VulDB Base Score: 4.3
VulDB Temp Score: 3.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
02/25/2014 🔍02/25/2014 🔍
02/25/2014 🔍
02/26/2014 🔍
03/03/2014 🔍
04/12/2025 🔍
Sources
Vendor: cisco.comAdvisory: Cisco Unified Contact Center Express CCMConfig Sensitive Information Disclosure Vulnerability
Organization: Cisco
Status: Confirmed
Coordinated: 🔍
CVE: CVE-2014-2102 (🔍)
GCVE (CVE): GCVE-0-2014-2102
GCVE (VulDB): GCVE-100-12448
X-Force: 91433 - Cisco Unified Contact Center Express CCMConfig page information disclosure, Medium Risk
SecurityFocus: 65797 - Cisco Unified Contact Center Express CVE-2014-2102 Information Disclosure Vulnerability
SecurityTracker: 1029842
See also: 🔍
Entry
Created: 03/03/2014 13:29Updated: 04/12/2025 17:05
Changes: 03/03/2014 13:29 (44), 03/30/2019 20:02 (17), 06/15/2021 08:31 (3), 04/12/2025 17:05 (15)
Complete: 🔍
Committer:
Cache ID: 216:B4A:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.