ID

VAR-201508-0507


CVE

CVE-2015-4299


TITLE

Cisco Unified Web and E-mail Interaction Manager Vulnerable to deleting the default system folder for messaging queues

Trust: 0.8

sources: JVNDB: JVNDB-2015-004356

DESCRIPTION

Cisco Unified Web and E-Mail Interaction Manager 9.0(2) improperly performs authorization, which allows remote authenticated users to remove default messaging-queue system folders via unspecified vectors, aka Bug ID CSCuo89046. Vendors have confirmed this vulnerability Bug ID CSCuo89046 It is released as. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlRemotely authenticated users could delete the default system folder in the messaging queue. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Web Interaction Manager is a product that can help call center business representatives use websites and text chats or real-time Web collaboration to answer customer questions; E-mail Interaction Manager is a product used to manage a large number of customer emails submitted to corporate mailboxes or websites

Trust: 1.98

sources: NVD: CVE-2015-4299 // JVNDB: JVNDB-2015-004356 // BID: 74572 // VULHUB: VHN-82260

AFFECTED PRODUCTS

vendor:ciscomodel:unified web and e-mail interaction managerscope:eqversion:9.0\(2\)

Trust: 1.6

vendor:ciscomodel:unified web and e-mail interaction managerscope:eqversion:9.0(2)

Trust: 0.8

vendor:ciscomodel:unified web interaction managerscope:eqversion:9.0(2)

Trust: 0.3

vendor:ciscomodel:unified e-mail interaction managerscope:eqversion:9.0(2)

Trust: 0.3

sources: BID: 74572 // JVNDB: JVNDB-2015-004356 // CNNVD: CNNVD-201508-378 // NVD: CVE-2015-4299

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4299
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-4299
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201508-378
value: MEDIUM

Trust: 0.6

VULHUB: VHN-82260
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4299
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-82260
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-82260 // JVNDB: JVNDB-2015-004356 // CNNVD: CNNVD-201508-378 // NVD: CVE-2015-4299

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-82260 // JVNDB: JVNDB-2015-004356 // NVD: CVE-2015-4299

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201508-378

TYPE

Design Error

Trust: 0.3

sources: BID: 74572

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004356

PATCH

title:40429url:http://tools.cisco.com/security/center/viewAlert.x?alertId=40429

Trust: 0.8

sources: JVNDB: JVNDB-2015-004356

EXTERNAL IDS

db:NVDid:CVE-2015-4299

Trust: 2.8

db:BIDid:74572

Trust: 2.0

db:SECTRACKid:1033285

Trust: 1.1

db:JVNDBid:JVNDB-2015-004356

Trust: 0.8

db:CNNVDid:CNNVD-201508-378

Trust: 0.7

db:VULHUBid:VHN-82260

Trust: 0.1

sources: VULHUB: VHN-82260 // BID: 74572 // JVNDB: JVNDB-2015-004356 // CNNVD: CNNVD-201508-378 // NVD: CVE-2015-4299

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40429

Trust: 2.0

url:http://www.securityfocus.com/bid/74572

Trust: 1.7

url:http://www.securitytracker.com/id/1033285

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4299

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4299

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/customer-collaboration/unified-email-interaction-manager/index.html

Trust: 0.3

url:http://www.cisco.com/c/en/us/products/customer-collaboration/unified-web-interaction-manager/index.html

Trust: 0.3

sources: VULHUB: VHN-82260 // BID: 74572 // JVNDB: JVNDB-2015-004356 // CNNVD: CNNVD-201508-378 // NVD: CVE-2015-4299

CREDITS

Cisco

Trust: 0.9

sources: BID: 74572 // CNNVD: CNNVD-201508-378

SOURCES

db:VULHUBid:VHN-82260
db:BIDid:74572
db:JVNDBid:JVNDB-2015-004356
db:CNNVDid:CNNVD-201508-378
db:NVDid:CVE-2015-4299

LAST UPDATE DATE

2025-04-13T23:29:32.522000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-82260date:2016-12-28T00:00:00
db:BIDid:74572date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004356date:2015-08-25T00:00:00
db:CNNVDid:CNNVD-201508-378date:2015-08-20T00:00:00
db:NVDid:CVE-2015-4299date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-82260date:2015-08-19T00:00:00
db:BIDid:74572date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004356date:2015-08-25T00:00:00
db:CNNVDid:CNNVD-201508-378date:2015-08-18T00:00:00
db:NVDid:CVE-2015-4299date:2015-08-19T15:59:02.727