CVE-2004-1760
Summary
| CVE | CVE-2004-1760 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-01-21 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | The default installation of Cisco voice products, when running the IBM Director Agent on IBM servers before OS 2000.2.6, does not require authentication, which allows remote attackers to gain administrator privileges by connecting to TCP port 14247. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Call Manager | 1.0 | All | All | All |
| Hardware | Cisco | Call Manager | 2.0 | All | All | All |
| Hardware | Cisco | Call Manager | 3.0 | All | All | All |
| Hardware | Cisco | Call Manager | 3.1 | All | All | All |
| Hardware | Cisco | Call Manager | 3.1\(2\) | All | All | All |
| Hardware | Cisco | Call Manager | 3.1\(3a\) | All | All | All |
| Hardware | Cisco | Call Manager | 3.2 | All | All | All |
| Hardware | Cisco | Call Manager | 3.3 | All | All | All |
| Hardware | Cisco | Call Manager | 3.3\(3\) | All | All | All |
| Hardware | Cisco | Call Manager | 4.0 | All | All | All |
| Operating System | Cisco | Conference Connection | 1.1\(1\) | All | All | All |
| Operating System | Cisco | Conference Connection | 1.2 | All | All | All |
| Application | Cisco | Emergency Responder | 1.1 | All | All | All |
| Hardware | Cisco | Internet Service Node | All | All | All | All |
| Application | Cisco | Ip Call Center Express Enhanced | 3.0 | All | All | All |
| Application | Cisco | Ip Call Center Express Standard | 3.0 | All | All | All |
| Application | Cisco | Ip Interactive Voice Response | 3.0 | All | All | All |
| Application | Cisco | Personal Assistant | 1.3\(1\) | All | All | All |
| Application | Cisco | Personal Assistant | 1.3\(2\) | All | All | All |
| Application | Cisco | Personal Assistant | 1.3\(3\) | All | All | All |
| Application | Cisco | Personal Assistant | 1.3\(4\) | All | All | All |
| Application | Cisco | Personal Assistant | 1.4\(1\) | All | All | All |
| Application | Cisco | Personal Assistant | 1.4\(2\) | All | All | All |
| Application | Ibm | Director Agent | 2.2 | All | All | All |
| Application | Ibm | Director Agent | 3.11 | All | All | All |
| Hardware | Ibm | Mcs-7815-1000 | All | All | All | All |
| Hardware | Ibm | Mcs-7815i-2.0 | All | All | All | All |
| Hardware | Ibm | Mcs-7835i-2.4 | All | All | All | All |
| Hardware | Ibm | Mcs-7835i-3.0 | All | All | All | All |
| Hardware | Ibm | X330 | 8654 | All | All | All |
| Hardware | Ibm | X330 | 8674 | All | All | All |
| Hardware | Ibm | X340 | All | All | All | All |
| Hardware | Ibm | X342 | All | All | All | All |
| Hardware | Ibm | X345 | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| www.osvdb.org/3692 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| Secunia - Advisories - Cisco Voice Products Director Agent Insecure Default Installation | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| www.ciac.org/ciac/bulletins/o-066.shtml | af854a3a-2127-422b-91ae-364da2661108 | www.ciac.org | |
| US-CERT Vulnerability Note VU#602734 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | Patch, Third Party Advisory, US Government Resource |
| Cisco Personal Assistant Default Configuration on IBM Servers Grants Administrative Access to Remote Users - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Cisco Voice Product IBM Director Agent Unauthorized Remote Administrative Access Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | af854a3a-2127-422b-91ae-364da2661108 | www.cisco.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.