Vulnerability Details : CVE-2012-0366
Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administrative password by leveraging the Help Desk Administrator role, aka Bug ID CSCtd45141.
Exploit prediction scoring system (EPSS) score for CVE-2012-0366
Probability of exploitation activity in the next 30 days: 0.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 43 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-0366
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST |
CWE ids for CVE-2012-0366
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0366
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc
Multiple Vulnerabilities in Cisco Unity ConnectionVendor Advisory
Products affected by CVE-2012-0366
- cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(3a\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(3a\)su1a:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5a\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5b\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(3\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(4\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(5\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(4a\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.1\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.1\(1\)_es1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.1\(1\)_es12:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.1\(1\)_sr1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(2b\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(2b\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(2a\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.0\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.0\(2a\)su2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.0\(2a\)su3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(3b\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(4a\)su2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.0\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(2a\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(3a\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5\)su1a:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5b\)su3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:6.1\(3b\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(4\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(5\)su2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.2\(1\)sr2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(3\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(3b\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5b\)su2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:7.1\(5b\)su4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(5\)su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:2.1\(5\)su3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.2\(1\)_es65:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:unity_connection:1.1:*:*:*:*:*:*:*