Vulnerability Details : CVE-2016-1373
The gadgets-integration API in Cisco Finesse 8.5(1) through 8.5(5), 8.6(1), 9.0(1), 9.0(2), 9.1(1), 9.1(1)SU1, 9.1(1)SU1.1, 9.1(1)ES1 through 9.1(1)ES5, 10.0(1), 10.0(1)SU1, 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 through 10.5(1)ES4, 10.5(1)SU1, 10.5(1)SU1.1, 10.5(1)SU1.7, 10.6(1), 10.6(1)SU1, 10.6(1)SU2, and 11.0(1) allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCuw86623.
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2016-1373
- cpe:2.3:a:cisco:finesse:10.0\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.6\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:11.0\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(2\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(3\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.6\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_su1.7:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.0\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.6\(1\)_su2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_su1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_su1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(4\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(5\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.0\(1\)_su1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.0\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.6\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.0\(2\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1373
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1373
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
3.9
|
4.0
|
NIST |
References for CVE-2016-1373
-
http://www.securitytracker.com/id/1035756
Cisco Finesse API Access Control Flaw Lets Remote Users Conduct Server-Side Request Forgery Attacks - SecurityTracker
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-finesse
Cisco Finesse HTTP Request Processing Server-Side Request Forgery VulnerabilityVendor Advisory
Jump to