Логотип exploitDog
bind:CVE-2021-1143
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-1143

Количество 3

Количество 3

nvd логотип

CVE-2021-1143

около 5 лет назад

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xmcr-q7rg-rxqc

больше 3 лет назад

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2021-00301

около 5 лет назад

Уязвимость интерфейса командной строки программного средства Cisco Connected Mobile Experiences, позволяющая нарушителю раскрыть информацию о пользователях системы CMX

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-1143

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

CVSS3: 4.3
0%
Низкий
около 5 лет назад
github логотип
GHSA-xmcr-q7rg-rxqc

A vulnerability in Cisco Connected Mobile Experiences (CMX) API authorizations could allow an authenticated, remote attacker to enumerate what users exist on the system. The vulnerability is due to a lack of authorization checks for certain API GET requests. An attacker could exploit this vulnerability by sending specific API GET requests to an affected device. A successful exploit could allow the attacker to enumerate users of the CMX system.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-00301

Уязвимость интерфейса командной строки программного средства Cisco Connected Mobile Experiences, позволяющая нарушителю раскрыть информацию о пользователях системы CMX

CVSS3: 4.3
0%
Низкий
около 5 лет назад

Уязвимостей на страницу