The Remote Mobile Access Subsystem in Cisco Unified Communications Manager (CM) 10.0(1) and earlier does not properly validate the Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof VCS core devices via a crafted certificate issued by a legitimate Certification Authority, aka Bug ID CSCuq86376.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/62267 - | |
| References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7991 - Vendor Advisory | |
| References | () http://tools.cisco.com/security/center/viewAlert.x?alertId=36381 - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/71013 - | |
| References | () http://www.securitytracker.com/id/1031181 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98574 - | 
Information
                Published : 2014-11-14 00:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-7991
Mitre link : CVE-2014-7991
CVE.ORG link : CVE-2014-7991
JSON object : View
Products Affected
                cisco
- unified_communications_manager
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
