search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Mutare Software Enabled VoiceMail (EVM) system web interface cross-site request forgery vulnerabilities

Vulnerability Note VU#136612

Original Release Date: 2011-02-23 | Last Revised: 2011-02-23

Overview

The Mutare Software Enabled VoiceMail (EVM) system web interface is susceptible to cross-site request forgery and cross-site scripting attacks.

Description

The Mutare Software Enabled VoiceMail (EVM) system web interface allows the user to change their Enabled VoiceMail (EVM) PIN, delete their voice messages, and add or modify their email delivery address for voicemails. These HTTP requests do not perform proper validity checks and are susceptible to cross-site request forgery and cross-site scripting attacks.

Impact

An attacker can change a user's Enabled VoiceMail (EVM) PIN, delete their voice messages, and add or modify their email delivery address for voicemails, if able to trick a user into visiting a specially crafted link.

Solution

We are currently unaware of a practical solution to this problem.

Restrict access

Restrict network access to the Mutare Software Enabled VoiceMail (EVM) system web interface and other devices using open protocols like HTTP.

Vendor Information

136612
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Travis Lee for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: None
Severity Metric: 2.16
Date Public: 2011-02-23
Date First Published: 2011-02-23
Date Last Updated: 2011-02-23 14:19 UTC
Document Revision: 16

Sponsored by CISA.