CVE-2009-0632
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
12/03/2009
Last modified:
09/04/2025
Description
The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.
Impact
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.2\(3\)sr1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.2\(3\)sr2b:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.2\(3\)sr3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.2\(3\)sr4:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.3\(1\)sr.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.3\(2\):*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:4.3\(2\)sr1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:5.1\(1\):*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:5.1\(2\):*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:5.1\(2a\):*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:unified_communications_manager:5.1\(2b\):*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/52589
- http://secunia.com/advisories/34238
- http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml
- http://www.securityfocus.com/bid/34082
- http://www.securitytracker.com/id?1021839=
- http://www.vupen.com/english/advisories/2009/0675
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49196
- http://osvdb.org/52589
- http://secunia.com/advisories/34238
- http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml
- http://www.securityfocus.com/bid/34082
- http://www.securitytracker.com/id?1021839=
- http://www.vupen.com/english/advisories/2009/0675
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49196