ID

VAR-201610-0293


CVE

CVE-2016-6445


TITLE

Cisco Meeting Server and Acano Server of XMPP Vulnerability to impersonate a legitimate user in the service

Trust: 0.8

sources: JVNDB: JVNDB-2016-005699

DESCRIPTION

A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) service of the Cisco Meeting Server (CMS) before 2.0.6 and Acano Server before 1.8.18 and 1.9.x before 1.9.6 could allow an unauthenticated, remote attacker to masquerade as a legitimate user. This vulnerability is due to the XMPP service incorrectly processing a deprecated authentication scheme. A successful exploit could allow an attacker to access the system as another user. Vendors have confirmed this vulnerability Bug ID CSCvb62741 It is released as.A third party could impersonate a legitimate user. Cisco Meeting Server is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. This issue is tracked by Cisco Bug ID CSCvb62741. The following products are affected affected: Cisco Meeting Server Versions prior to 2.0.6 are vulnerable. Cisco Acano Server Versions prior to 1.8.18 and 1.9.6 are vulnerable

Trust: 1.98

sources: NVD: CVE-2016-6445 // JVNDB: JVNDB-2016-005699 // BID: 93517 // VULHUB: VHN-95265

AFFECTED PRODUCTS

vendor:ciscomodel:meeting serverscope:eqversion:2.0.3

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:1.8.15

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:2.0.0

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:2.0.1

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:2.0.4

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:1.9.2

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:2.0.5

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:1.8_base

Trust: 1.6

vendor:ciscomodel:meeting serverscope:eqversion:1.9.0

Trust: 1.6

vendor:ciscomodel:meeting serverscope:ltversion:1.9.x (acano server)

Trust: 0.8

vendor:ciscomodel:meeting serverscope:ltversion:(acano server)

Trust: 0.8

vendor:ciscomodel:meeting serverscope:eqversion:1.9.6

Trust: 0.8

vendor:ciscomodel:meeting serverscope:eqversion:1.8.18

Trust: 0.8

vendor:ciscomodel:meetings serverscope:eqversion:1.9.2

Trust: 0.3

vendor:ciscomodel:meetings serverscope:eqversion:1.9

Trust: 0.3

vendor:ciscomodel:meetings serverscope:eqversion:1.8.15

Trust: 0.3

vendor:ciscomodel:meetings serverscope:eqversion:1.8

Trust: 0.3

vendor:ciscomodel:meetings serverscope:eqversion:1.7.24

Trust: 0.3

vendor:ciscomodel:meetings serverscope:eqversion:1.7

Trust: 0.3

vendor:ciscomodel:acano serverscope:eqversion:1.9

Trust: 0.3

vendor:ciscomodel:acano serverscope:eqversion:1.8

Trust: 0.3

vendor:ciscomodel:meetings serverscope:neversion:2.0.6

Trust: 0.3

vendor:ciscomodel:acano serverscope:neversion:1.9.6

Trust: 0.3

vendor:ciscomodel:acano serverscope:neversion:1.8.18

Trust: 0.3

sources: BID: 93517 // JVNDB: JVNDB-2016-005699 // CNNVD: CNNVD-201610-803 // NVD: CVE-2016-6445

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6445
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-6445
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201610-803
value: MEDIUM

Trust: 0.6

VULHUB: VHN-95265
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-6445
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-95265
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6445
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-95265 // JVNDB: JVNDB-2016-005699 // CNNVD: CNNVD-201610-803 // NVD: CVE-2016-6445

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-95265 // JVNDB: JVNDB-2016-005699 // NVD: CVE-2016-6445

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-803

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201610-803

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005699

PATCH

title:cisco-sa-20161012-mscurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-msc

Trust: 0.8

title:Cisco Meeting Server Fixes for authentication bypassing vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65138

Trust: 0.6

sources: JVNDB: JVNDB-2016-005699 // CNNVD: CNNVD-201610-803

EXTERNAL IDS

db:NVDid:CVE-2016-6445

Trust: 2.8

db:BIDid:93517

Trust: 1.4

db:SECTRACKid:1037000

Trust: 1.1

db:JVNDBid:JVNDB-2016-005699

Trust: 0.8

db:CNNVDid:CNNVD-201610-803

Trust: 0.7

db:VULHUBid:VHN-95265

Trust: 0.1

sources: VULHUB: VHN-95265 // BID: 93517 // JVNDB: JVNDB-2016-005699 // CNNVD: CNNVD-201610-803 // NVD: CVE-2016-6445

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161012-msc

Trust: 2.0

url:http://www.securityfocus.com/bid/93517

Trust: 1.1

url:http://www.securitytracker.com/id/1037000

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6445

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6445

Trust: 0.8

url:https://www.acano.com

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-95265 // BID: 93517 // JVNDB: JVNDB-2016-005699 // CNNVD: CNNVD-201610-803 // NVD: CVE-2016-6445

CREDITS

Cisco

Trust: 0.3

sources: BID: 93517

SOURCES

db:VULHUBid:VHN-95265
db:BIDid:93517
db:JVNDBid:JVNDB-2016-005699
db:CNNVDid:CNNVD-201610-803
db:NVDid:CVE-2016-6445

LAST UPDATE DATE

2025-04-13T23:32:36.956000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-95265date:2017-07-30T00:00:00
db:BIDid:93517date:2016-10-26T02:05:00
db:JVNDBid:JVNDB-2016-005699date:2016-11-04T00:00:00
db:CNNVDid:CNNVD-201610-803date:2016-10-28T00:00:00
db:NVDid:CVE-2016-6445date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-95265date:2016-10-27T00:00:00
db:BIDid:93517date:2016-10-12T00:00:00
db:JVNDBid:JVNDB-2016-005699date:2016-11-04T00:00:00
db:CNNVDid:CNNVD-201610-803date:2016-10-28T00:00:00
db:NVDid:CVE-2016-6445date:2016-10-27T21:59:17.063