Cisco Finesse Information Disclosure (cisco-sa-20170503-finesse-ucce)

medium Nessus Plugin ID 130093

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

According to its self-reported version, the Cisco Finesse Software is affected by an information disclosure vulnerability. This could allow an unauthenticated, remote attacker to retrieve information from agents using the Finesse Desktop. The vulnerability is due to the existence of a user account that has an undocumented, hard-coded password. An attacker could exploit this vulnerability by using the hard-coded credentials to subscribe to the Finesse Notification Service, which would allow the attacker to receive notifications when an agent signs in or out of the Finesse Desktop, when information about an agent changes, or when an agent's state changes.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Apply the patch or upgrade to the version recommended in Cisco bug ID CSCvc08314

See Also

http://www.nessus.org/u?5bfe00b0

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc08314

Plugin Details

Severity: Medium

ID: 130093

File Name: cisco-sa-20170503-finesse-ucce.nasl

Version: 1.2

Type: local

Family: CISCO

Published: 10/21/2019

Updated: 10/30/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2017-6626

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:finesse

Required KB Items: installed_sw/Cisco VOSS Finesse, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 5/3/2017

Vulnerability Publication Date: 5/3/2017

Reference Information

CVE: CVE-2017-6626