The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

cybersecurity threat CVE-2019-12711

Cisco Unified Communications Manager: external XML entity injection

Synthesis of the vulnerability

An attacker can transmit malicious XML data to Cisco Unified Communications Manager, in order to read a file, scan sites, or trigger a denial of service.
Severity of this announce: 2/4.
Creation date: 03/10/2019.
Références of this computer vulnerability: CERTFR-2019-AVI-481, cisco-sa-20191002-cucm-xxe, CSCvp46079, CVE-2019-12711, VIGILANCE-VUL-30517.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can transmit malicious XML data to Cisco Unified Communications Manager, in order to read a file, scan sites, or trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

This computer threat note impacts software or systems such as Cisco CUCM.

Our Vigil@nce team determined that the severity of this weakness alert is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer weakness note.

Solutions for this threat

Cisco Unified Communications Manager: solution CSCvp46079.
The solution is described on the Cisco site:
  https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp46079
  https://tools.cisco.com/bugsearch/bug/CSCvp46079
  https://tools.cisco.com/quickview/bug/CSCvp46079
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides system vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.