Vulnerability Details : CVE-2007-1062
The Cisco Unified IP Conference Station 7935 3.2(15) and earlier, and Station 7936 3.3(12) and earlier does not properly handle administrator HTTP sessions, which allows remote attackers to bypass authentication controls via a direct URL request to the administrative HTTP interface for a limited time
Products affected by CVE-2007-1062
- cpe:2.3:o:cisco:unified_ip_conference_station_7935_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:unified_ip_conference_station_firmware_7936:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1062
3.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-1062
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2007-1062
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-1062
-
http://secunia.com/advisories/24262
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32623
VDB Entry
-
http://www.securityfocus.com/bid/22647
Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2007/0688
Vendor Advisory
-
http://osvdb.org/45245
Broken Link
-
http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml
Vendor Advisory
-
http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml
Patch;Vendor Advisory
-
http://securitytracker.com/id?1017680
Third Party Advisory;VDB Entry
Jump to