Vulnerabilities > CVE-2013-7030 - Cryptographic Issues vulnerability in Cisco Unified Communications Manager

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cisco
CWE-310
exploit available

Summary

The TFTP service in Cisco Unified Communications Manager (aka CUCM or Unified CM) allows remote attackers to obtain sensitive information from a phone via an RRQ operation, as demonstrated by discovering a cleartext UseUserCredential field in an SPDefault.cnf.xml file. NOTE: the vendor reportedly disputes the significance of this report, stating that this is an expected default behavior, and that the product's documentation describes use of the TFTP Encrypted Config option in addressing this issue

Vulnerable Configurations

Part Description Count
Application
Cisco
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Exploit-Db

descriptionCisco Unified Communications Manager - TFTP Service. CVE-2013-7030. Local exploit for hardware platform
fileexploits/hardware/local/30237.sh
idEDB-ID:30237
last seen2016-02-03
modified2013-12-12
platformhardware
port
published2013-12-12
reporterdaniel svartman
sourcehttps://www.exploit-db.com/download/30237/
titleCisco Unified Communications Manager - TFTP Service
typelocal