Summary
The remote host has a TFTP server installed that is serving one or more Cisco CallManager files.
These files do not themselves include any sensitive information, but do identify the TFTP server as being part of a Cisco CallManager environment. The CCM TFTP server is an essential part of providing VOIP handset functionality, so should not be exposed to unnecessary scrutiny.
Solution
If it is not required, disable or uninstall the TFTP server.
Otherwise restrict access to trusted sources only.
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache /server-status accessible
- Apple Safari WebKit Information Disclosure Vulnerability (Windows)
- AVG Anti-Virus 'hcp://' Protocol Handler Remote Code Execution Vulnerability
- Adobe Flex SDK 'SWF' Files Cross-Site Scripting Vulnerability (Windows)
- Apple Safari 'javascript: URI' XSS Vulnerability - Sep09