Vulnerability Description
Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Telepresence System Software | <= 6.0.5\(5\) |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=34327Vendor Advisory
- http://www.securitytracker.com/id/1030272Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=34327Vendor Advisory
- http://www.securitytracker.com/id/1030272Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-3274?
CVE-2014-3274 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory info...
How severe is CVE-2014-3274?
CVE-2014-3274 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3274?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Telepresence System Software.