search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Mutare Software Enabled VoiceMail (EVM) system web interface cross-site request forgery vulnerabilities

Vulnerability Note VU#136612

Original Release Date: 2011-02-23 | Last Revised: 2011-02-23

Overview

The Mutare Software Enabled VoiceMail (EVM) system web interface is susceptible to cross-site request forgery and cross-site scripting attacks.

Description

The Mutare Software Enabled VoiceMail (EVM) system web interface allows the user to change their Enabled VoiceMail (EVM) PIN, delete their voice messages, and add or modify their email delivery address for voicemails. These HTTP requests do not perform proper validity checks and are susceptible to cross-site request forgery and cross-site scripting attacks.

Impact

An attacker can change a user's Enabled VoiceMail (EVM) PIN, delete their voice messages, and add or modify their email delivery address for voicemails, if able to trick a user into visiting a specially crafted link.

Solution

We are currently unaware of a practical solution to this problem.

Restrict access

Restrict network access to the Mutare Software Enabled VoiceMail (EVM) system web interface and other devices using open protocols like HTTP.

Vendor Information

136612
 

Mutare Software Affected

Notified:  November 22, 2010 Updated: January 06, 2011

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Travis Lee for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: None
Severity Metric: 2.16
Date Public: 2011-02-23
Date First Published: 2011-02-23
Date Last Updated: 2011-02-23 14:19 UTC
Document Revision: 16

Sponsored by CISA.