Published: 05/10/2016 Updated: 30/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The j_spring_security_switch_user function in Cisco Unified Intelligence Center (CUIC) 8.5.4 up to and including 9.1(1), as used in Unified Contact Center Express 10.0(1) up to and including 11.0(1), allows remote malicious users to create user accounts by visiting an unspecified web page, aka Bug IDs CSCuy75027 and CSCuy81653.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

cisco unified contact center express 11.0\\(1\\)

cisco unified intelligence center 8.5.4

cisco unified contact center express 10.6\\(1\\)

cisco unified intelligence center 9.0\\(2\\)

cisco unified contact center express 10.5\\(1\\)

cisco unified intelligence center 9.1\\(1\\)

cisco unified contact center express 10.0\\(1\\)

Vendor Advisories

A vulnerability in the j_spring_security_switch_user function of Cisco Unified Intelligence Center (CUIC) Software could allow an unauthenticated, remote attacker to make certain changes to the system The vulnerability is due to improper implementation of authorization controls when accessing certain web pages of the application An attacker coul ...