Information disclosure in Cisco Finesse - CVE-2017-6626
Published: May 5, 2017
Vulnerability identifier: #VU6423
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6626
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Finesse
Cisco Finesse
Detailed vulnerability description
The vulnerability allows a remote unauthenticated user to obtain potentially sensitive information on the target system.
The weakness exists due to existence of a user account that has an undocumented, hard-coded password. A remote attacker can use hard-coded credentials, login with this account, retrieve potentially sensitive information and receive notifications when an agent signs in or out of the Finesse Desktop, when information about an agent changes, or when an agent's state changes.
Successful exploitation of the vulnerability results in information disclosure.
The weakness exists due to existence of a user account that has an undocumented, hard-coded password. A remote attacker can use hard-coded credentials, login with this account, retrieve potentially sensitive information and receive notifications when an agent signs in or out of the Finesse Desktop, when information about an agent changes, or when an agent's state changes.
Successful exploitation of the vulnerability results in information disclosure.
How to mitigate CVE-2017-6626
Install update from vendor's website.