| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.1 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cisco Unified CallManager 4.x. It has been declared as problematic. This affects an unknown part. Executing a manipulation can lead to credentials management. This vulnerability is registered as CVE-2009-0632. No exploit is available. It is recommended to upgrade the affected component.
Details
A vulnerability was found in Cisco Unified CallManager 4.x. It has been declared as critical. This vulnerability affects some unknown processing. The manipulation with an unknown input leads to a credentials management vulnerability. The CWE definition for the vulnerability is CWE-255. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.
The bug was discovered 03/11/2009. The weakness was published 03/12/2009 with Dimension Data & LBI (Website). The advisory is shared for download at cisco.com. This vulnerability was named CVE-2009-0632 since 02/18/2009. The attack needs to be approached locally. Required for exploitation is a single authentication. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1552.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $5k-$25k.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (49196), SecurityFocus (BID 34082†), OSVDB (52589†), Secunia (SA34238†) and SecurityTracker (ID 1021839†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.0VulDB Meta Temp Score: 6.1
VulDB Base Score: 7.0
VulDB Temp Score: 6.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Credentials managementCWE: CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 63562
OpenVAS Name: Ubuntu USN-731-1 (apache2)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
02/18/2009 🔍03/11/2009 🔍
03/11/2009 🔍
03/11/2009 🔍
03/11/2009 🔍
03/12/2009 🔍
03/12/2009 🔍
03/12/2009 🔍
03/12/2009 🔍
03/13/2009 🔍
03/17/2009 🔍
08/30/2019 🔍
Sources
Vendor: cisco.comAdvisory: cisco.com
Organization: Dimension Data & LBI
Status: Confirmed
CVE: CVE-2009-0632 (🔍)
GCVE (CVE): GCVE-0-2009-0632
GCVE (VulDB): GCVE-100-3940
X-Force: 49196 - Cisco Unified Communications Manager PAB privilege escalation, High Risk
SecurityFocus: 34082 - Cisco Unified Communications Manager PAB Synchronizer Privilege Escalation Vulnerability
Secunia: 34238 - Cisco Unified Communications Manager IP Phone PAB Information Disclosure, Less Critical
OSVDB: 52589 - Cisco Unified Communications Manager IP Phone PAB Disclosure Privilege Escalation
SecurityTracker: 1021839
Vulnerability Center: 21303 - [cisco-sa-20090311-cucmpab] Cisco Unified Communications Manager Privilege Escalation Vulnerability, High
Vupen: ADV-2009-0675
Entry
Created: 03/13/2009 15:22Updated: 08/30/2019 19:00
Changes: 03/13/2009 15:22 (85), 08/30/2019 19:00 (1)
Complete: 🔍
Cache ID: 216:A2E:103
Once again VulDB remains the best source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.