Cisco Enterprise Chat And Email12.6(1)ES6

CPE Details

Cisco Enterprise Chat And Email12.6(1)ES6
12.6\(1\)es6
2025-04-21
11h00 +00:00
2025-04-21
11h00 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\(1\)es6:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

enterprise_chat_and_email

Version

12.6\(1\)es6

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-20484 2024-11-06 16h29 +00:00 A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources > Services > Unified CCE > EAAS, then click Start.
7.5
High
CVE-2024-20367 2024-04-03 16h22 +00:00 A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
5.4
Medium