-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3700
                   Cisco Unified Communications Manager
                              3 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Unified Communications Manager
Publisher:         Cisco Systems
Operating System:  Network Appliance
Impact/Access:     Cross-site Scripting       -- Remote/Unauthenticated      
                   Denial of Service          -- Remote/Unauthenticated      
                   Cross-site Request Forgery -- Remote with User Interaction
                   Access Confidential Data   -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15272 CVE-2019-12716 CVE-2019-12715
                   CVE-2019-12711 CVE-2019-12710 CVE-2019-12707
                   CVE-2019-1915  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-xss-12715
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-xss-12716
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cuc-inject
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ucm-secbypass
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-xxe
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cucm-csrf
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-cuc-xss

Comment: This bulletin contains seven (7) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Unified Communications Manager Cross-Site Scripting Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-cucm-xss-12715

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo42294

CVE-2019-12715   

CWE-79

CVSS Score:
6.1  AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of Cisco Unified Communications
    Manager and Cisco Unified Communications Manager Session Management Edition
    (SME) could allow an unauthenticated, remote attacker to conduct a
    cross-site scripting (XSS) attack against a user of the web-based interface
    of the affected software.

    The vulnerability is due to insufficient validation of user-supplied input
    by the web-based interface of the affected software. An attacker could
    exploit this vulnerability by persuading a user of the interface to click a
    crafted link. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive browser-based information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-xss-12715

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    Unified Communications Manager and Cisco Unified Communications Manager SME
    releases:

       10.5(2) and earlier
       11.5(1)SU5 and earlier
       12.0(1)SU2 and earlier
       12.5(1) and earlier

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco Unified Communications
    Manager and Cisco Unified Communications Manager SME releases contained the
    fix for this vulnerability:

       10.5(2)SU9 and later
       11.5(1)SU6 and later
       12.0(1)SU3 and later
       12.5(1)SU1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-xss-12715

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Unified Communications Manager Cross-Site Scripting Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-cucm-xss-12716

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo42317

CVE-2019-12716   

CWE-79

CVSS Score:
6.1  AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of Cisco Unified Communications
    Manager and Cisco Unified Communications Manager Session Management Edition
    (SME) could allow an unauthenticated, remote attacker to conduct a
    cross-site scripting (XSS) attack against a user of the web-based
    interface.

    The vulnerability is due to insufficient validation of user-supplied input
    by the web-based interface of the affected software. An attacker could
    exploit this vulnerability by persuading a user of the interface to click a
    crafted link. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive browser-based information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-xss-12716

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    Unified Communications Manager and Cisco Unified Communications Manager SME
    releases:

       10.5(2) and earlier
       11.5(1)SU5 and earlier
       12.0(1)SU2 and earlier
       12.5(1) and earlier

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco Unified Communications
    Manager and Cisco Unified Communications Manager SME releases contained the
    fix for this vulnerability:

       10.5(2)SU9 and later
       11.5(1)SU6 and later
       12.0(1)SU3 and later
       12.5(1)SU1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-xss-12716

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Unified Communications Manager SQL Injection Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-cuc-inject

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo42378

CVE-2019-12710   

CWE-89

CVSS Score:
4.9  AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of Cisco Unified Communications
    Manager and Cisco Unified Communications Manager Session Management Edition
    (SME) could allow an authenticated, remote attacker to impact the
    confidentiality of an affected system by executing arbitrary SQL queries.

    The vulnerability exists because the affected software improperly validates
    user-supplied input in SQL queries. An attacker could exploit this
    vulnerability by sending crafted requests that contain malicious SQL
    statements to the affected application. A successful exploit could allow
    the attacker to determine the presence of certain values in the database,
    impacting the confidentiality of the system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cuc-inject

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    Unified Communications Manager and Cisco Unified Communications Manager SME
    releases:

       10.5(2) and earlier
       11.5(1)SU5 and earlier
       12.0(1)SU2 and earlier
       12.5(1) and earlier

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco Unified Communications
    Manager and Cisco Unified Communications Manager SME releases contained the
    fix for this vulnerability:

       10.5(2)SU9 and later
       11.5(1)SU6 and later
       12.0(1)SU3 and later
       12.5(1)SU1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cuc-inject

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Unified Communications Manager Security Bypass Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-ucm-secbypass

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp14434

CVE-2019-15272   

CWE-264

CVSS Score:
6.5  AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of Cisco Unified Communications
    Manager and Cisco Unified Communications Manager Session Management Edition
    (SME) could allow an unauthenticated, remote attacker to bypass security
    restrictions.

    The vulnerability is due to improper handling of malformed HTTP methods. An
    attacker could exploit this vulnerability by sending a crafted HTTP request
    to the affected system. A successful exploit could allow the attacker to
    gain unauthorized access to the system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-ucm-secbypass

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    Unified Communications Manager and Cisco Unified Communications Manager SME
    releases:

       10.5(2) and earlier
       11.5(1)SU5 and earlier
       12.0(1)SU2 and earlier
       12.5(1) and earlier

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco Unified Communications
    Manager and Cisco Unified Communications Manager SME releases contained the
    fix for this vulnerability:

       10.5(2)SU9 and later
       11.5(1)SU6 and later
       12.0(1)SU3 and later
       12.5(1)SU1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-ucm-secbypass

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Cisco Unified Communications Manager XML External Expansion Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-cucm-xxe

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp46079

CVE-2019-12711   

CWE-611

CVSS Score:
6.1  AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of Cisco Unified Communications
    Manager and Cisco Unified Communications Manager Session Management Edition
    (SME) could allow an unauthenticated, remote attacker to access sensitive
    information or cause a denial of service (DoS) condition.

    The vulnerability is due to improper restrictions on XML entities. An
    attacker could exploit this vulnerability by sending malicious requests to
    an affected system that contain references in XML entities. A successful
    exploit could allow the attacker to retrieve files from the local system,
    resulting in the disclosure of sensitive information, or cause the
    application to consume available resources, resulting in a DoS condition.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-xxe

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    Unified Communications Manager and Cisco Unified Communications Manager SME
    releases:

       10.5(2) and earlier
       11.5(1)SU5 and earlier
       12.0(1)SU2 and earlier
       12.5(1) and earlier

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco Unified Communications
    Manager and Cisco Unified Communications Manager SME releases contained the
    fix for this vulnerability:

       10.5(2)SU9 and later
       11.5(1)SU6 and later
       12.0(1)SU3 and later
       12.5(1)SU1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-xxe

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Multiple Cisco Unified Communications Products Cross-Site Request Forgery
Vulnerability

Priority:        High

Advisory ID:     cisco-sa-20191002-cucm-csrf

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvo42306CSCvo91541CSCvo99233

CVE-2019-1915    

CWE-352

CVSS Score:
6.5  AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of Cisco Unified Communications
    Manager, Cisco Unified Communications Manager Session Management Edition
    (SME), Cisco Unified Communications Manager IM and Presence (Unified CM IM&
    P) Service, and Cisco Unity Connection could allow an unauthenticated,
    remote attacker to conduct a cross-site request forgery (CSRF) attack on an
    affected system.

    The vulnerability is due to insufficient CSRF protections by the affected
    software. An attacker could exploit this vulnerability by persuading a
    targeted user to click a malicious link. A successful exploit could allow
    the attacker to send arbitrary requests that could change the password of a
    targeted user. An attacker could then take unauthorized actions on behalf
    of the targeted user.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-csrf

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco Unified Communications Manager, Cisco
    Unified Communications Manager SME, Cisco Unified CM IM&P Service, and
    Cisco Unity Connection.

    For information about which releases are vulnerable, see the Fixed Software
    section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Unified Communications Manager and Unified Communications Manager Session
    Management Edition: CSCvo42306

    The Unified Communications Manager Software can be downloaded from the
    Software Center on Cisco.com by navigating to Products > Unified
    Communications > Call Control > Unified Communications Manager
    (CallManager) .

    Unified Communications First Fixed Release for This Vulnerability
    Manager Release
    Earlier than 10.5(2)   10.5(2)SU9
                           Apply patch file
    10.5(2)                ciscocm_CSCvo42306_CSRFFix_105X_v1.5.cop.sgn or
                           upgrade to 10.5(2)SU9.
    11.0                   11.5(1)SU6
                           Apply patch file
    11.5                   ciscocm_CSCvo42306_CSRFFix_11_5X_v1.7.cop.sgn or
                           upgrade to 11.5(1)SU6.
                           Apply patch file
    12.0                   ciscocm_CSCvo42306_CSRFFix_12_0X_v1.7.cop.sgn or
                           upgrade to 12.0(1)SU3.
                           Apply patch file
    12.5                   ciscocm_CSCvo42306_CSRFFix_12_5X_v1.7.cop.sgn or
                           upgrade to 12.5(1)SU1.

    Unified Communications Manager IM and Presence Service: CSCvo99233

    The Unified Communications Manager IM and Presence Service Software can be
    downloaded from the Software Center on Cisco.com by navigating to Products
    > Unified Communications > Unified Communications Applications > Presence
    Software > Unified Communications Manager IM & Presence Service .

    Unified Communications     First Fixed Release for This Vulnerability
    Manager IM and Presence
    Service Release
    Earlier than 10.5(2)       10.5(2) ES
                               Apply patch file
    10.5(2)                    ciscocm_CSCvo99233_CSRFFixForCUP_1052X.cop.sgn 
                               or upgrade to 10.5(2) ES.
    11.0                       11.5(1)SU6
                               Apply patch file
    11.5                       ciscocm_CSCvo99233_CSRFFixForCUP_115X_v2.cop.sgn
                               or upgrade to 11.5(1)SU6.
    12.0                       12.5(1)SU1
                               Apply patch file
    12.5                       ciscocm_CSCvo99233_CSRFFixForCUP_125X.cop.sgn or
                               upgrade to 12.5(1)SU1.

    Unity Connection: CSCvo91541

    The Unity Connection Software can be downloaded from the Software Center on
    Cisco.com by navigating to Products > Unified Communications > Unified
    Communications Applications > Messaging > Unity Connection .

    Unity Connection First Fixed Release for This Vulnerability
    Release
    Earlier than     10.5(2)SU9
    10.5(2)
                     Apply patch file
    10.5(2)          ciscocm.CSCvo91541_CSRFFix_10.5x.k3.cop.sgn or upgrade to
                     10.5(2)SU9.
    11.0             11.5(1)SU6
                     Apply patch file
    11.5             ciscocm.CSCvo91541_CSRFFix_11.5x.k3.cop.sgn or upgrade to
                     11.5(1)SU6.
                     Apply patch file
    12.0             ciscocm.CSCvo91541_CSRFFix_12.0x.k3.cop.sgn or upgrade to
                     12.0(1)SU3.
                     Apply patch file
    12.5             ciscocm.CSCvo91541_CSRFFix_12.5x.k3.cop.sgn or upgrade to
                     12.5(1)SU1.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cucm-csrf

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

==================================================================================

Multiple Cisco Unified Communications Products Cross-Site Scripting
Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-20191002-cuc-xss

First Published: 2019 October 2 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds availableCisco Bug IDs:   CSCvp14284CSCvq12061CSCvq13816

CVE-2019-12707   

CWE-79

CVSS Score:
6.1  AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the web-based interface of multiple Cisco Unified
    Communications products could allow an unauthenticated, remote attacker to
    conduct a cross-site scripting (XSS) attack against a user of the web-based
    interface of the affected software.

    The vulnerability is due to insufficient validation of user-supplied input
    by the web-based interface of the affected software. An attacker could
    exploit this vulnerability by persuading a user of the interface to click a
    crafted link. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive browser-based information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cuc-xss

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    products and releases:

       Unified Communications Manager and Unified Communications Manager
        Session Management Edition (SME) releases 10.5(2) and earlier, 11.5(1)
        SU5 and earlier, and 12.5(1) and earlier
       Unified Communications Manager IM & Presence Service (IM&P) releases
        11.5(1)SU5 and earlier and 12.5(1) and earlier
       Unity Connection releases 11.5(1)SU5 and earlier and 12.5(1) and
        earlier

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page , to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco products and releases
    contained the fix for this vulnerability:

       Unified Communications Manager and Unified Communications Manager SME
        releases 10.5(2)SU9 and later, 11.5(1)SU6 and later, and 12.5(1)SU1 and
        later
       Unified Communications Manager IM&P releases 11.5(1)SU6 and later and
        12.5(1)SU1 and later
       Unity Connection releases 11.5(1)SU6 and later and 12.5(1)SU1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20191002-cuc-xss

Revision History

  o +---------+--------------------------+---------+--------+-----------------+
    | Version |       Description        | Section | Status |      Date       |
    +---------+--------------------------+---------+--------+-----------------+
    | 1.0     | Initial public release.  | -       | Final  | 2019-October-02 |
    +---------+--------------------------+---------+--------+-----------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXZU+aGaOgq3Tt24GAQh+jw/+Mn5mEBoxhNBm8dup78ckFCntNZAnqL3z
U97DLToR+fwj2N4BQR0qpzzDmif1gY1wHzQi+xVSRRKLNytdentV7Q1FGGBQOJxP
oyM88hP/gHNytx6zs3KS0yDNj/QTuxLg4WgAqV5ulqBLP6tTirawyRxh0KD6vuUC
cz69e+PfG6cO4WHlC7KbXaihb8DCnReHO2DVmbSPz7S4KL7lvAjAZY8f5hE04f9T
wF1R672r3jMqMduXQLILYyCJ5KcHSw7E8KKDuIZmI1w5NDW5A4dzcILaFftmKpOA
UPIEF2H2CR4BtRgkXFdBVgzLdIM8/rjcLh+vqiSyY4nJk0vQdkr+4wDmrcyiRHkZ
AtzYZsegEuyn3O1L2KfcbDfDIyqWRZQx/WQPjEa8qvYQeI4CtJut23lhbsQuu6Jg
CNSsrd8JfUkWqb3lPjAIQGxoi9CIZAhwICm0XuzDKJxpDbfVqq8kD6lzpwZ8FV1x
JPGBPfA5SSSK1UUE8ndtcWGfsmPWJPx1xlSetZ+yzG523tqx1t1z/b99cbv45CcQ
peMfGu41Nv6cNErQ8BR/6ZK10WFaLIGs2gpnRVsiGGO1HA2p2sm5Y5yIQ3eH1oaZ
ryycJ+Wl4h5AUaR71Oh6zRrMsb5ttKSDQ+OTdNeJ1KdQ9sRZOdaRlloK4i4Jt4q0
M2yAngZj6ls=
=tHOF
-----END PGP SIGNATURE-----