A vulnerability in the Representational State Transfer (REST) interface of Cisco Spark could allow an unauthenticated, remote attacker to make changes to an affected system system.
 
The vulnerability is due to improper implementation of authorization controls when accessing certain web pages of the application. An attacker could exploit this vulnerability by accessing the web pages and creating unauthorized user accounts.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-sp1
A vulnerability in the Representational State Transfer (REST) interface of Cisco Spark could allow an unauthenticated, remote attacker to make changes to an affected system system.
 
The vulnerability is due to improper implementation of authorization controls when accessing certain web pages of the application. An attacker could exploit this vulnerability by accessing the web pages and creating unauthorized user accounts.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-sp1

Security Impact Rating: Medium

CVE: CVE-2016-1322