Cisco Unified Intelligence Center server-side request forgery | CVE-2023-20062
NAME
__________
Cisco Unified Intelligence Center server-side request forgery
Platforms Affected:
Cisco Unified Contact Center Enterprise
Cisco Unified Contact Center Express
Cisco Unified Intelligence Center (CUIC)
Cisco Packaged Contact Center Enterprise
Risk Level:
5
Exploitability:
Unproven
Consequences:
Obtain Information
DESCRIPTION
__________
Cisco Unified Intelligence Center is vulnerable to server-side request forgery, caused by improper input validation for specific HTTP requests. By sending a specially-crafted HTTP request, an attacker could exploit this vulnerability to conduct SSRF attack to send arbitrary network requests.
CVSS 3.0 Information
__________
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Access Vector:
Network
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
![Cisco Unified Intelligence Center server-side request forgery | CVE-2023-20062 1 Digital Patreon Wordmark FieryCoralv2](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.
![Cisco Unified Intelligence Center server-side request forgery | CVE-2023-20062 2 join](https://www.redpacketsecurity.com/wp-content/uploads/2022/06/join.png)
![Cisco Unified Intelligence Center server-side request forgery | CVE-2023-20062 3 discord](https://www.redpacketsecurity.com/wp-content/uploads/2022/06/discord.png)
![Cisco Unified Intelligence Center server-side request forgery | CVE-2023-20062 4 reddit](https://www.redpacketsecurity.com/wp-content/uploads/2022/06/reddit-2000x690.png)
![Cisco Unified Intelligence Center server-side request forgery | CVE-2023-20062 5 hd linkedin](https://www.redpacketsecurity.com/wp-content/uploads/2022/08/hd-linkedin.webp)