Guest

Preview Tool

Cisco Bug: CSCvu99625 - CIAM: php 5.4.4

Last Modified

Jul 21, 2020

Products (1)

  • Cisco Unified Communications Manager (CallManager)

Known Affected Releases

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-9912 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9912
CVE-2015-4116 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116
CVE-2015-4644 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644
CVE-2015-5589 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5589
CVE-2015-6833 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6833
CVE-2015-6835 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
CVE-2015-6837 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837
CVE-2015-8835 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835
CVE-2016-10160 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
CVE-2016-2554 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554
CVE-2016-3141 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141
CVE-2016-3142 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142
CVE-2016-4342 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342
CVE-2016-4343 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
CVE-2016-4537 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537
CVE-2016-4538 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538
CVE-2016-4539 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539
CVE-2016-4540 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540
CVE-2016-4541 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541
CVE-2016-4542 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542
CVE-2016-4543 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543
CVE-2016-5093 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
CVE-2016-5096 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
CVE-2016-5114 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114
CVE-2016-5771 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
CVE-2016-5773 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
CVE-2016-6288 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288
CVE-2016-6289 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289
CVE-2016-6290 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290
CVE-2016-6291 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291
CVE-2016-6294 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294
CVE-2016-6296 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296
CVE-2016-6297 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297
CVE-2016-7124 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124
CVE-2016-7126 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
CVE-2016-7127 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
CVE-2016-7129 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
CVE-2016-7411 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
CVE-2016-7412 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
CVE-2016-7413 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
CVE-2016-7414 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
CVE-2016-7417 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
CVE-2016-7480 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7480
CVE-2016-9137 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137
CVE-2016-9138 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138
CVE-2016-9935 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
CVE-2017-11147 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11147
CVE-2017-11628 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628
CVE-2017-12933 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933
CVE-2019-9023 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.