Security restrictions bypass in Cisco Spark - CVE-2018-0119
Published: February 7, 2018 / Updated: February 8, 2018
Cisco Spark
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.
The vulnerability exists due to the improper display of user-account tokens generated in the system. A remote attacker can log in to the device with a token in use by another account and cause a partial impact to the device's confidentiality, integrity, and availability.