Summary
The remote host has a TFTP server installed that is serving one or more Cisco CallManager files.
These files do not themselves include any sensitive information, but do identify the TFTP server as being part of a Cisco CallManager environment. The CCM TFTP server is an essential part of providing VOIP handset functionality, so should not be exposed to unnecessary scrutiny.
Solution
If it is not required, disable or uninstall the TFTP server.
Otherwise restrict access to trusted sources only.
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apple Safari Webkit Multiple Vulnerabilities - June13 (Mac OS X)
- Apple Safari 'setInterval()' Address Bar Spoofing Vulnerability (Win)
- Adobe Flash Player Multiple Security Bypass Vulnerabilities - 01 Feb14 (Linux)
- Apple Safari Multiple Vulnerabilities Dec13 (Mac OS X)
- Apache Tomcat XML External Entity Information Disclosure Vulnerability