Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xmcr-q7rg-rxqc

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

EPSS

Процентиль: 32%
0.00126
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-862
CWE-863

Связанные уязвимости

CVSS3: 4.3
nvd
около 5 лет назад

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

CVSS3: 4.3
fstec
около 5 лет назад

Уязвимость интерфейса командной строки программного средства Cisco Connected Mobile Experiences, позволяющая нарушителю раскрыть информацию о пользователях системы CMX

EPSS

Процентиль: 32%
0.00126
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-862
CWE-863