Prime Collaboration Deployment Cisco Prime Collaboration Deployment

Do you want an email whenever new security vulnerabilities are reported in Cisco Prime Collaboration Deployment?

Recent Cisco Prime Collaboration Deployment Security Advisories

Advisory Title Published
2023-04-26 Cisco Prime Collaboration Deployment Cross-Site Scripting Vulnerability April 26, 2023

By the Year

In 2024 there have been 0 vulnerabilities in Cisco Prime Collaboration Deployment . Last year Prime Collaboration Deployment had 1 security vulnerability published. Right now, Prime Collaboration Deployment is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 7.50
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Prime Collaboration Deployment vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Prime Collaboration Deployment Security Vulnerabilities

A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface

CVE-2023-20259 7.5 - High - October 04, 2023

A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device. This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Prime Collaboration Deployment or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe