CVE-2020-3177Path Traversal in Cisco Unified Communications Manager

CWE-22Path Traversal8 documents5 sources
Severity
7.5HIGHNVD
EPSS
0.9%
top 23.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 15
Latest updateMay 24

Description

A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the TAPS interface of the affected device. An attacker could exploit this vulnerability by sending a crafted request to th

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

🔴Vulnerability Details

6
GHSA
GHSA-fpr9-pr9g-872c: A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications M2022-05-24
OSV
python2.7 vulnerability2022-02-08
OSV
python2.7 vulnerability2021-03-03
OSV
python2.7 regression2021-02-25
OSV
python2.7, python3.4, python3.5, python3.6, python3.8 vulnerabilities2021-02-25

📋Vendor Advisories

1
Cisco
Cisco Unified Communications Manager Path Traversal Vulnerability2020-04-15
CVE-2020-3177 — Path Traversal in Cisco | cvebase