U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-1226

Change History

Initial Analysis by NIST 1/19/2021 1:30:01 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:cisco:emergency_responder:10.5\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:emergency_responder:11.5\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:emergency_responder:12.0\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:* versions from (including) 12.5\(1\) up to (excluding) 12.5\(1\)su3
     *cpe:2.3:a:cisco:prime_license_manager:10.5\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:prime_license_manager:*:*:*:*:*:*:*:* versions from (including) 11.5\(1\) up to (excluding) 11.5\(1\)su9
     *cpe:2.3:a:cisco:unified_communications_manager:10.5\(2\):*:*:*:-:*:*:*
     *cpe:2.3:a:cisco:unified_communications_manager:10.5\(2\):*:*:*:session_management:*:*:*
     *cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:* versions from (including) 11.5\(1\) up to (excluding) 11.5\(1\)su9
     *cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:* versions from (including) 11.5\(1\) up to (excluding) 11.5\(1\)su9
     *cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:10.5\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:*:*:*:*:*:*:*:* versions from (including) 11.5\(1\) up to (excluding) 11.5\(1\)su9
     *cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:12.0\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:*:*:*:*:*:*:*:* versions from (including) 12.5\(1\) up to (excluding) 12.5\(1\)su3
     *cpe:2.3:a:cisco:unity_connection:10.5\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:* versions from (including) 11.5\(1\) up to (excluding) 11.5\(1\)su9
     *cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:* versions from (including) 12.0\(1\) up to (excluding) 12.0\(1\)su4
     *cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:* versions from (including) 12.5\(1\) up to (excluding) 12.5\(1\)su3
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Added CWE

								
							
							
						
NIST CWE-532
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-logging-6QSWKRYz No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-logging-6QSWKRYz Vendor Advisory