8.6
CVSSv3

CVE-2016-1373

Published: 05/05/2016 Updated: 01/12/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 8.6 | Impact Score: 4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The gadgets-integration API in Cisco Finesse 8.5(1) up to and including 8.5(5), 8.6(1), 9.0(1), 9.0(2), 9.1(1), 9.1(1)SU1, 9.1(1)SU1.1, 9.1(1)ES1 up to and including 9.1(1)ES5, 10.0(1), 10.0(1)SU1, 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 up to and including 10.5(1)ES4, 10.5(1)SU1, 10.5(1)SU1.1, 10.5(1)SU1.7, 10.6(1), 10.6(1)SU1, 10.6(1)SU2, and 11.0(1) allows remote malicious users to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCuw86623.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco finesse 9.1\\(1\\)_es2

cisco finesse 9.1\\(1\\)_es3

cisco finesse 8.5\\(2\\)_base

cisco finesse 8.5\\(3\\)_base

cisco finesse 10.6\\(1\\)_su1

cisco finesse 10.6\\(1\\)_base

cisco finesse 10.5\\(1\\)_su1.7

cisco finesse 10.5\\(1\\)_base

cisco finesse 10.0\\(1\\)_base

cisco finesse 9.1\\(1\\)_es1

cisco finesse 9.0\\(1\\)_base

cisco finesse 8.5\\(1\\)_base

cisco finesse 11.0\\(1\\)_base

cisco finesse 10.6\\(1\\)_su2

cisco finesse 10.5\\(1\\)_su1

cisco finesse 10.5\\(1\\)_su1.1

cisco finesse 9.1\\(1\\)_es4

cisco finesse 9.1\\(1\\)_es5

cisco finesse 9.1\\(1\\)_su1.1

cisco finesse 8.5\\(4\\)_base

cisco finesse 8.5\\(5\\)_base

cisco finesse 10.5\\(1\\)_es1

cisco finesse 10.5\\(1\\)_es2

cisco finesse 10.0\\(1\\)_su1.1

cisco finesse 10.0\\(1\\)_su1

cisco finesse 9.1\\(1\\)_su1

cisco finesse 9.1\\(1\\)_base

cisco finesse 8.6\\(1\\)_base

cisco finesse 9.0\\(2\\)_base

cisco finesse 10.5\\(1\\)_es3

cisco finesse 10.5\\(1\\)_es4