Vulnerability Details : CVE-2016-1373
The gadgets-integration API in Cisco Finesse 8.5(1) through 8.5(5), 8.6(1), 9.0(1), 9.0(2), 9.1(1), 9.1(1)SU1, 9.1(1)SU1.1, 9.1(1)ES1 through 9.1(1)ES5, 10.0(1), 10.0(1)SU1, 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 through 10.5(1)ES4, 10.5(1)SU1, 10.5(1)SU1.1, 10.5(1)SU1.7, 10.6(1), 10.6(1)SU1, 10.6(1)SU2, and 11.0(1) allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCuw86623.
Vulnerability category: Server-side request forgery (SSRF)
Exploit prediction scoring system (EPSS) score for CVE-2016-1373
Probability of exploitation activity in the next 30 days: 0.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 52 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-1373
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
3.9
|
4.0
|
NIST |
References for CVE-2016-1373
-
http://www.securitytracker.com/id/1035756
Cisco Finesse API Access Control Flaw Lets Remote Users Conduct Server-Side Request Forgery Attacks - SecurityTracker
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-finesse
Cisco Finesse HTTP Request Processing Server-Side Request Forgery VulnerabilityVendor Advisory
Products affected by CVE-2016-1373
- cpe:2.3:a:cisco:finesse:10.0\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.6\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:11.0\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(2\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(3\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.6\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_su1.7:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.0\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.6\(1\)_su2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_su1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_es5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_su1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(4\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.5\(5\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.0\(1\)_su1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.0\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_su1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.1\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:8.6\(1\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:9.0\(2\)_base:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:finesse:10.5\(1\)_es4:*:*:*:*:*:*:*