All the vulnerabilites related to Cisco - Cisco TelePresence Endpoint Software (TC/CE)
cve-2022-20931
Vulnerability from cvelistv5
Published
2024-11-15 15:30
Modified
2024-11-15 15:47
Severity ?
EPSS score ?
Summary
Cisco Touch 10 Device Downgrade Attack Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco TelePresence Endpoint Software (TC/CE) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-20931", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:47:05.719923Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:47:25.217Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the version control of Cisco\u0026nbsp;TelePresence CE Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device.\r\nThis vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco\u0026nbsp;TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-527", "description": "Exposure of Version-Control Repository to an Unauthorized Control Sphere", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:30:29.164Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-CTT-DAV-HSvEHHEt", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt" } ], "source": { "advisory": "cisco-sa-CTT-DAV-HSvEHHEt", "defects": [ "CSCvw12012" ], "discovery": "INTERNAL" }, "title": "Cisco Touch 10 Device Downgrade Attack Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20931", "datePublished": "2024-11-15T15:30:29.164Z", "dateReserved": "2021-11-02T13:28:29.192Z", "dateUpdated": "2024-11-15T15:47:25.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20094
Vulnerability from cvelistv5
Published
2024-11-15 15:08
Modified
2024-11-15 15:43
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:43:09.416209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:43:30.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.\r\n\r\nThis vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.\r\nNote: This vulnerability only affects Cisco Webex Desk Hub.\r\nThere are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:08:14.206Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwb86296" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20094", "datePublished": "2024-11-15T15:08:04.290Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T15:43:30.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26068
Vulnerability from cvelistv5
Published
2020-11-18 17:40
Modified
2024-11-13 17:40
Severity ?
EPSS score ?
Summary
Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM | vendor-advisory, x_refsource_CISCO |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco TelePresence Endpoint Software (TC/CE) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201118 Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-26068", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:22:19.788303Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:40:15.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the xAPI service of Cisco Telepresence CE Software and Cisco RoomOS Software could allow an authenticated, remote attacker to generate an access token for an affected device. The vulnerability is due to insufficient access authorization. An attacker could exploit this vulnerability by using the xAPI service to generate a specific token. A successful exploit could allow the attacker to use the generated token to enable experimental features on the device that should not be available to users." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T17:40:14", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201118 Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM" } ], "source": { "advisory": "cisco-sa-tp-uathracc-jWNESUfM", "defect": [ [ "CSCvu31646" ] ], "discovery": "INTERNAL" }, "title": "Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-11-18T16:00:00", "ID": "CVE-2020-26068", "STATE": "PUBLIC", "TITLE": "Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco TelePresence Endpoint Software (TC/CE)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the xAPI service of Cisco Telepresence CE Software and Cisco RoomOS Software could allow an authenticated, remote attacker to generate an access token for an affected device. The vulnerability is due to insufficient access authorization. An attacker could exploit this vulnerability by using the xAPI service to generate a specific token. A successful exploit could allow the attacker to use the generated token to enable experimental features on the device that should not be available to users." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639" } ] } ] }, "references": { "reference_data": [ { "name": "20201118 Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM" } ] }, "source": { "advisory": "cisco-sa-tp-uathracc-jWNESUfM", "defect": [ [ "CSCvu31646" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26068", "datePublished": "2020-11-18T17:40:14.843607Z", "dateReserved": "2020-09-24T00:00:00", "dateUpdated": "2024-11-13T17:40:15.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20004
Vulnerability from cvelistv5
Published
2024-11-15 15:23
Modified
2024-11-15 15:37
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Write Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20004", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:37:09.280084Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:37:26.021Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.15.4" }, { "status": "affected", "version": "CE9.15.16.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:23:29.140Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc47206" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Write Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20004", "datePublished": "2024-11-15T15:23:29.140Z", "dateReserved": "2022-10-27T18:47:50.305Z", "dateUpdated": "2024-11-15T15:37:26.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20090
Vulnerability from cvelistv5
Published
2024-11-15 15:19
Modified
2024-11-15 17:15
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "telepresence_collaboration_endpoint", "vendor": "cisco", "versions": [ { "status": "affected", "version": "9.0.1" }, { "status": "affected", "version": "9.10.1" }, { "status": "affected", "version": "9.10.2" }, { "status": "affected", "version": "9.10.3" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.2" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.5" }, { "status": "affected", "version": "9.1.3" }, { "status": "affected", "version": "9.13.0" }, { "status": "affected", "version": "9.13.1" }, { "status": "affected", "version": "9.13.2" }, { "status": "affected", "version": "9.13.3" }, { "status": "affected", "version": "9.1.4" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.5" }, { "status": "affected", "version": "9.14.6" }, { "status": "affected", "version": "9.1.5" }, { "status": "affected", "version": "9.15.0.10" }, { "status": "affected", "version": "9.15.0.11" }, { "status": "affected", "version": "9.15.13.0" }, { "status": "affected", "version": "9.15.8.12" }, { "status": "affected", "version": "9.1.6" }, { "status": "affected", "version": "9.2.1" }, { "status": "affected", "version": "9.2.2" }, { "status": "affected", "version": "9.2.3" }, { "status": "affected", "version": "9.2.4" }, { "status": "affected", "version": "9.9.3" }, { "status": "affected", "version": "9.9.4" } ] }, { "cpes": [ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "telepresence_collaboration_endpoint", "vendor": "cisco", "versions": [ { "status": "affected", "version": "9.15.0.19" }, { "status": "affected", "version": "9.15.10.8" }, { "status": "affected", "version": "9.15.13.0" }, { "status": "affected", "version": "9.15.15.4" }, { "status": "affected", "version": "9.15.16.5" }, { "status": "affected", "version": "9.15.3.18" }, { "status": "affected", "version": "9.15.3.19" }, { "status": "affected", "version": "9.15.3.22" }, { "status": "affected", "version": "9.15.3.25" }, { "status": "affected", "version": "9.15.3.26" }, { "status": "affected", "version": "9.15.8.12" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20090", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:49:25.857316Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:15:43.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.15.4" }, { "status": "affected", "version": "CE9.15.16.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-27", "description": "Path Traversal: \u0027dir/../../filename\u0027", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:19:09.891Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc85883" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20090", "datePublished": "2024-11-15T15:19:09.891Z", "dateReserved": "2022-10-27T18:47:50.335Z", "dateUpdated": "2024-11-15T17:15:43.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20002
Vulnerability from cvelistv5
Published
2023-01-19 01:40
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-roomos-dkjGFgRK", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "RoomOS 10.3.2.0" }, { "status": "affected", "version": "RoomOS 10.3.4.0" }, { "status": "affected", "version": "RoomOS 10.8.2.5" }, { "status": "affected", "version": "RoomOS 10.11.5.2" }, { "status": "affected", "version": "RoomOS 10.8.4.0" }, { "status": "affected", "version": "RoomOS 10.11.3.0" }, { "status": "affected", "version": "RoomOS 10.15.3.0" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "RoomOS 10.8.4.0" }, { "status": "affected", "version": "RoomOS 10.11.3.0" }, { "status": "affected", "version": "RoomOS 10.11.5.2" }, { "status": "affected", "version": "RoomOS 10.15.3.0" }, { "status": "affected", "version": "9.15.3.25" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "Server-Side Request Forgery (SSRF)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:28.759Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-dkjGFgRK", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK" } ], "source": { "advisory": "cisco-sa-roomos-dkjGFgRK", "defects": [ "CSCwc85914" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20002", "datePublished": "2023-01-19T01:40:44.838Z", "dateReserved": "2022-10-27T18:47:50.305Z", "dateUpdated": "2024-08-02T08:57:35.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26086
Vulnerability from cvelistv5
Published
2020-11-06 18:15
Modified
2024-11-13 17:44
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tele-info-DrEGLpDQ | vendor-advisory, x_refsource_CISCO |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco TelePresence Endpoint Software (TC/CE) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20201104 Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tele-info-DrEGLpDQ" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-26086", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:22:37.424607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T17:44:55.552Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-06T18:15:33", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20201104 Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tele-info-DrEGLpDQ" } ], "source": { "advisory": "cisco-sa-tele-info-DrEGLpDQ", "defect": [ [ "CSCvv34713" ] ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-11-04T16:00:00", "ID": "CVE-2020-26086", "STATE": "PUBLIC", "TITLE": "Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco TelePresence Endpoint Software (TC/CE)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-668" } ] } ] }, "references": { "reference_data": [ { "name": "20201104 Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tele-info-DrEGLpDQ" } ] }, "source": { "advisory": "cisco-sa-tele-info-DrEGLpDQ", "defect": [ [ "CSCvv34713" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26086", "datePublished": "2020-11-06T18:15:33.870910Z", "dateReserved": "2020-09-24T00:00:00", "dateUpdated": "2024-11-13T17:44:55.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20091
Vulnerability from cvelistv5
Published
2024-11-15 15:15
Modified
2024-11-15 17:48
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco TelePresence Endpoint Software (TC/CE) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20091", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:47:56.924902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:48:19.183Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.15.4" }, { "status": "affected", "version": "CE9.15.16.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:15:03.615Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc71178" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20091", "datePublished": "2024-11-15T15:15:03.615Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T17:48:19.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20093
Vulnerability from cvelistv5
Published
2024-11-15 15:11
Modified
2024-11-15 15:43
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20093", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:42:49.987851Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:43:07.839Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:11:19.884Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc71187" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20093", "datePublished": "2024-11-15T15:11:19.884Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T15:43:07.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20008
Vulnerability from cvelistv5
Published
2023-01-19 01:41
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.
This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-roomos-dkjGFgRK", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "RoomOS 10.3.2.0" }, { "status": "affected", "version": "RoomOS 10.3.4.0" }, { "status": "affected", "version": "RoomOS 10.8.2.5" }, { "status": "affected", "version": "RoomOS 10.11.5.2" }, { "status": "affected", "version": "RoomOS 10.8.4.0" }, { "status": "affected", "version": "RoomOS 10.11.3.0" }, { "status": "affected", "version": "RoomOS 10.15.3.0" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "TC7.3.21" }, { "status": "affected", "version": "RoomOS 10.8.4.0" }, { "status": "affected", "version": "RoomOS 10.11.3.0" }, { "status": "affected", "version": "RoomOS 10.11.5.2" }, { "status": "affected", "version": "RoomOS 10.15.3.0" }, { "status": "affected", "version": "9.15.3.25" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\r\n\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:30.027Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-dkjGFgRK", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK" } ], "source": { "advisory": "cisco-sa-roomos-dkjGFgRK", "defects": [ "CSCwc47201" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20008", "datePublished": "2023-01-19T01:41:03.629Z", "dateReserved": "2022-10-27T18:47:50.307Z", "dateUpdated": "2024-08-02T08:57:35.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20793
Vulnerability from cvelistv5
Published
2024-11-15 15:34
Modified
2024-11-15 21:12
Severity ?
EPSS score ?
Summary
Cisco Touch 10 Device Insufficient Identity Verification Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "roomos", "vendor": "cisco", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "telepresence_tc_software", "vendor": "cisco", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:telepresence_ce_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "telepresence_ce_software", "vendor": "cisco", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-20793", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T21:07:36.103341Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:12:23.388Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in pairing process of Cisco\u0026nbsp;TelePresence CE Software and RoomOS Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device.\r\nThis vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-325", "description": "Missing Required Cryptographic Step", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:34:33.919Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-CTT-IVV-4A66Dsfj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj" } ], "source": { "advisory": "cisco-sa-CTT-IVV-4A66Dsfj", "defects": [ "CSCvw08723" ], "discovery": "INTERNAL" }, "title": "Cisco Touch 10 Device Insufficient Identity Verification Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20793", "datePublished": "2024-11-15T15:34:33.919Z", "dateReserved": "2021-11-02T13:28:29.168Z", "dateUpdated": "2024-11-15T21:12:23.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20092
Vulnerability from cvelistv5
Published
2024-11-15 15:12
Modified
2024-11-15 15:42
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:42:30.481069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:42:48.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:12:58.590Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc47236" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20092", "datePublished": "2024-11-15T15:12:58.590Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T15:42:48.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1532
Vulnerability from cvelistv5
Published
2021-05-06 12:51
Modified
2024-11-08 23:15
Severity ?
EPSS score ?
Summary
Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-rmos-fileread-pE9sL3g | vendor-advisory, x_refsource_CISCO |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco TelePresence Endpoint Software (TC/CE) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210505 Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-rmos-fileread-pE9sL3g" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1532", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:43:03.700891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:15:51.737Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability is due to insufficient path validation of command arguments. An attacker could exploit this vulnerability by sending a crafted command request to the xAPI. A successful exploit could allow the attacker to read the contents of any file that is located on the device filesystem." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T12:51:29", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210505 Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-rmos-fileread-pE9sL3g" } ], "source": { "advisory": "cisco-sa-tp-rmos-fileread-pE9sL3g", "defect": [ [ "CSCvx68427" ] ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-05-05T16:00:00", "ID": "CVE-2021-1532", "STATE": "PUBLIC", "TITLE": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco TelePresence Endpoint Software (TC/CE)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability is due to insufficient path validation of command arguments. An attacker could exploit this vulnerability by sending a crafted command request to the xAPI. A successful exploit could allow the attacker to read the contents of any file that is located on the device filesystem." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "20210505 Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-rmos-fileread-pE9sL3g" } ] }, "source": { "advisory": "cisco-sa-tp-rmos-fileread-pE9sL3g", "defect": [ [ "CSCvx68427" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1532", "datePublished": "2021-05-06T12:51:29.224987Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:15:51.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }