Description
The Remote Mobile Access Subsystem in Cisco Unified Communications Manager (CM) 10.0(1) and earlier does not properly validate the Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof VCS core devices via a crafted certificate issued by a legitimate Certification Authority, aka Bug ID CSCuq86376.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
psirt@cisco.com
http://secunia.com/advisories/62267psirt@cisco.com
http://www.securityfocus.com/bid/71013psirt@cisco.com
http://www.securitytracker.com/id/1031181psirt@cisco.com
https://exchange.xforce.ibmcloud.com/vulnerabilities/98574af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/62267af854a3a-2127-422b-91ae-364da2661108
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7991af854a3a-2127-422b-91ae-364da2661108
http://tools.cisco.com/security/center/viewAlert.x?alertId=36381af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/71013af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id/1031181af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/98574