{"api_version":"1","generated_at":"2026-04-23T06:18:52+00:00","cve":"CVE-2006-2166","urls":{"html":"https://cve.report/CVE-2006-2166","api":"https://cve.report/api/cve/CVE-2006-2166.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2166","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2166"},"summary":{"title":"CVE-2006-2166","description":"Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-05-04 12:38:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"2.1","severity":"","vector":"AV:N/AC:H/Au:S/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:N","baseScore":2.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://www.securityfocus.com/bid/17775","name":"http://www.securityfocus.com/bid/17775","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Cisco Unity Express Expired Password Privilege Escalation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26165","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26165","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016015","name":"http://securitytracker.com/id?1016015","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Cisco Unity Express Lets Remote Authenticated Users Gain Administrative Privileges","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/25165","name":"http://www.osvdb.org/25165","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.cisco.com/warp/public/707/cisco-sa-20060501-cue.shtml","name":"http://www.cisco.com/warp/public/707/cisco-sa-20060501-cue.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Cisco - Networking, Cloud, and Cybersecurity Solutions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19881","name":"http://secunia.com/advisories/19881","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Cisco Unity Express Expired Password Change Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1613","name":"http://www.vupen.com/english/advisories/2006/1613","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2166","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2166","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2166","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"unity_express","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2166","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unity_express_software","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2166","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unity_express_software","cpe6":"2.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2166","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"unity_express_software","cpe6":"2.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"2166","cve":"CVE-2006-2166","epss":"0.004960000","percentile":"0.658540000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:43:27.773Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"19881","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19881"},{"name":"ADV-2006-1613","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1613"},{"name":"25165","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25165"},{"name":"cisco-cue-privilege-escalation(26165)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26165"},{"name":"1016015","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016015"},{"name":"20060501 Cisco Unity Express Expired Password Reset Privilege Escalation","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://www.cisco.com/warp/public/707/cisco-sa-20060501-cue.shtml"},{"name":"17775","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/17775"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-05-01T00:00:00.000Z","descriptions":[{"lang":"en","value":"Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-19T15:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"19881","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19881"},{"name":"ADV-2006-1613","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1613"},{"name":"25165","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25165"},{"name":"cisco-cue-privilege-escalation(26165)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26165"},{"name":"1016015","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016015"},{"name":"20060501 Cisco Unity Express Expired Password Reset Privilege Escalation","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://www.cisco.com/warp/public/707/cisco-sa-20060501-cue.shtml"},{"name":"17775","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/17775"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2166","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"19881","refsource":"SECUNIA","url":"http://secunia.com/advisories/19881"},{"name":"ADV-2006-1613","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1613"},{"name":"25165","refsource":"OSVDB","url":"http://www.osvdb.org/25165"},{"name":"cisco-cue-privilege-escalation(26165)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26165"},{"name":"1016015","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016015"},{"name":"20060501 Cisco Unity Express Expired Password Reset Privilege Escalation","refsource":"CISCO","url":"http://www.cisco.com/warp/public/707/cisco-sa-20060501-cue.shtml"},{"name":"17775","refsource":"BID","url":"http://www.securityfocus.com/bid/17775"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-2166","datePublished":"2006-05-04T10:00:00.000Z","dateReserved":"2006-05-03T00:00:00.000Z","dateUpdated":"2024-08-07T17:43:27.773Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-05-04 12:38:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:N","baseScore":2.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_express_software:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"05328FC0-D20B-44AD-A72B-19D125553067"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_express_software:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"31397846-474A-46B3-8210-ADC20B93E4A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_express_software:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"68CE1AB1-1745-4C19-B3AC-72A033D69F87"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:unity_express:*:*:*:*:*:*:*:*","matchCriteriaId":"7583D706-3702-4571-BD2C-527E5337F6E1"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2166","Ordinal":"1","Title":"CVE-2006-2166","CVE":"CVE-2006-2166","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2166","Ordinal":"1","NoteData":"Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password.","Type":"Description","Title":"CVE-2006-2166"},{"CveYear":"2006","CveId":"2166","Ordinal":"2","NoteData":"2006-05-04","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2166","Ordinal":"3","NoteData":"2017-07-19","Type":"Other","Title":"Modified"}]}}}