Vigil@nce - Cisco Unified Communications Manager: bypassing authentication of Remote Mobile Access
November 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use an X.509 certificate with a SAN field on Cisco
Unified Communications Manager, in order to access to Remote
Mobile Access.
– Impacted products: Cisco CUCM
– Severity: 2/4
– Creation date: 12/11/2014
DESCRIPTION OF THE VULNERABILITY
The Cisco Unified Communications Manager product uses TLS
certificates to authenticate Remote Mobile Access Subsystem users.
However, an attacker can use a certificate, signed by a trusted
certification authority, but with a SAN (subjectAltName) field
indicating the wanted CN, in order to bypass the authentication.
An attacker can therefore use an X.509 certificate with a SAN
field on Cisco Unified Communications Manager, in order to access
to Remote Mobile Access.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN