#VU6423 Information disclosure in Cisco Finesse - CVE-2017-6626
Published: May 5, 2017
Vulnerability identifier: #VU6423
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6626
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco Finesse
Cisco Finesse
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote unauthenticated user to obtain potentially sensitive information on the target system.
The weakness exists due to existence of a user account that has an undocumented, hard-coded password. A remote attacker can use hard-coded credentials, login with this account, retrieve potentially sensitive information and receive notifications when an agent signs in or out of the Finesse Desktop, when information about an agent changes, or when an agent's state changes.
Successful exploitation of the vulnerability results in information disclosure.
The weakness exists due to existence of a user account that has an undocumented, hard-coded password. A remote attacker can use hard-coded credentials, login with this account, retrieve potentially sensitive information and receive notifications when an agent signs in or out of the Finesse Desktop, when information about an agent changes, or when an agent's state changes.
Successful exploitation of the vulnerability results in information disclosure.
Remediation
Install update from vendor's website.