Search criteria

93 vulnerabilities found for telepresence_collaboration_endpoint by cisco

FKIE_CVE-2025-20329

Vulnerability from fkie_nvd - Published: 2025-10-15 17:15 - Updated: 2025-12-01 18:13
Summary
A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII). Note: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A07A6D-5679-470C-A18E-4A812E38AA22",
              "versionEndIncluding": "9.15.18.5",
              "versionStartIncluding": "9.0.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8C28FB-9D5B-4696-A5FF-9778ED75A018",
              "versionEndExcluding": "11.32.2.1",
              "versionStartIncluding": "10.0.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative\u0026nbsp;credentials.\r\n\r\nThis vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII).\r\nNote: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials."
    }
  ],
  "id": "CVE-2025-20329",
  "lastModified": "2025-12-01T18:13:26.630",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-10-15T17:15:48.697",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-inf-disc-qGgsbxAm"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20094

Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-07-30 17:19
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device. This vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information. Note: This vulnerability only affects Cisco Webex Desk Hub. There are no workarounds that address this vulnerability.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6E03BA-F50B-4014-A7FF-E77435B4E055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F10D2C6-D629-45E1-966F-AB9EAB4EDB03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.\r\n\r\nThis vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.\r\nNote: This vulnerability only affects Cisco Webex Desk Hub.\r\nThere are no workarounds that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en Cisco TelePresence CE y RoomOS podr\u00eda permitir que un atacante adyacente no autenticado vea informaci\u00f3n confidencial en un dispositivo afectado. Esta vulnerabilidad existe porque el software afectado realiza comprobaciones de los l\u00edmites incorrectas. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar una lectura fuera de los l\u00edmites que revele informaci\u00f3n confidencial. Nota: Esta vulnerabilidad solo afecta a Cisco Webex Desk Hub. No existen workarounds que aborden esta vulnerabilidad."
    }
  ],
  "id": "CVE-2023-20094",
  "lastModified": "2025-07-30T17:19:36.683",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-15T16:15:26.390",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20090

Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-07-30 17:51
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC9A95F-008C-4C40-B3E4-6A784247DF34",
              "versionEndExcluding": "9.15.17.4",
              "versionStartIncluding": "9.0.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F9F684-CCE8-4FF5-821B-6133D2F2F375",
              "versionEndExcluding": "11.1.2.4",
              "versionStartIncluding": "10.0.1.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en Cisco TelePresence CE y RoomOS podr\u00eda permitir que un atacante local autenticado eleve los privilegios a superusuario en un dispositivo afectado. Esta vulnerabilidad se debe a un control de acceso inadecuado en determinados comandos de la CLI. Un atacante podr\u00eda aprovechar esta vulnerabilidad ejecutando una serie de comandos manipulados. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante elevar los privilegios a superusuario. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad."
    }
  ],
  "id": "CVE-2023-20090",
  "lastModified": "2025-07-30T17:51:17.940",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-15T16:15:25.560",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-27"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2023-20091

Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-07-30 17:51
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC9A95F-008C-4C40-B3E4-6A784247DF34",
              "versionEndExcluding": "9.15.17.4",
              "versionStartIncluding": "9.0.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8368A0D7-FA7C-498B-A30A-E55D86A82591",
              "versionEndExcluding": "11.1.3.1",
              "versionStartIncluding": "10.0.1.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco TelePresence CE y RoomOS podr\u00eda permitir que un atacante local autenticado sobrescribiera archivos arbitrarios en el sistema de archivos local de un dispositivo afectado. Esta vulnerabilidad se debe a controles de acceso inadecuados en los archivos que se encuentran en el sistema de archivos local. Un atacante podr\u00eda aprovechar esta vulnerabilidad colocando un enlace simb\u00f3lico en una ubicaci\u00f3n espec\u00edfica en el sistema de archivos local de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante sobrescribir archivos arbitrarios en el dispositivo afectado. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener una cuenta de usuario de soporte remoto. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad."
    }
  ],
  "id": "CVE-2023-20091",
  "lastModified": "2025-07-30T17:51:08.870",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 4.2,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-15T16:15:25.770",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-61"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20004

Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-07-30 17:51
Summary
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC9A95F-008C-4C40-B3E4-6A784247DF34",
              "versionEndExcluding": "9.15.17.4",
              "versionStartIncluding": "9.0.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F9F684-CCE8-4FF5-821B-6133D2F2F375",
              "versionEndExcluding": "11.1.2.4",
              "versionStartIncluding": "10.0.1.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Tres vulnerabilidades en la CLI de Cisco TelePresence CE y RoomOS podr\u00edan permitir que un atacante local autenticado sobrescriba archivos arbitrarios en el sistema de archivos local de un dispositivo afectado. Estas vulnerabilidades se deben a controles de acceso inadecuados en los archivos que se encuentran en el sistema de archivos local. Un atacante podr\u00eda explotar estas vulnerabilidades colocando un enlace simb\u00f3lico en una ubicaci\u00f3n espec\u00edfica en el sistema de archivos local de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante sobrescribir archivos arbitrarios en el dispositivo afectado. Para explotar estas vulnerabilidades, un atacante necesitar\u00eda tener una cuenta de usuario de soporte remoto. Nota: CVE-2023-20092 no afecta a los dispositivos Cisco DX70, DX80, TelePresence MX Series o TelePresence SX Series. Cisco ha publicado actualizaciones de software que solucionan estas vulnerabilidades. No existen workarounds que solucionen estas vulnerabilidades."
    }
  ],
  "id": "CVE-2023-20004",
  "lastModified": "2025-07-30T17:51:25.013",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-15T16:15:24.657",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20931

Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-07-31 16:56
Summary
A vulnerability in the version control of Cisco TelePresence CE Software for Cisco Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device. This vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Impacted products
Vendor Product Version
cisco telepresence_collaboration_endpoint *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C434A0-CADC-4636-89B5-75CDA4E8C726",
              "versionEndExcluding": "10.15.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the version control of Cisco\u0026nbsp;TelePresence CE Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device.\r\nThis vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco\u0026nbsp;TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el control de versiones del software Cisco TelePresence CE para dispositivos Cisco Touch 10 podr\u00eda permitir que un atacante adyacente no autenticado instale una versi\u00f3n anterior del software en un dispositivo afectado. Esta vulnerabilidad se debe a un control de versiones insuficiente. Un atacante podr\u00eda aprovechar esta vulnerabilidad instalando una versi\u00f3n anterior del software Cisco TelePresence CE en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante se aproveche de las vulnerabilidades en versiones anteriores del software. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad."
    }
  ],
  "id": "CVE-2022-20931",
  "lastModified": "2025-07-31T16:56:20.860",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-15T16:15:23.967",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-527"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20793

Vulnerability from fkie_nvd - Published: 2024-11-15 16:15 - Updated: 2025-07-30 17:12
Summary
A vulnerability in pairing process of Cisco TelePresence CE Software and RoomOS Software for Cisco Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device. This vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability.
Impacted products
Vendor Product Version
cisco telepresence_collaboration_endpoint 9.0.1
cisco telepresence_collaboration_endpoint 9.1.1
cisco telepresence_collaboration_endpoint 9.1.2
cisco telepresence_collaboration_endpoint 9.1.3
cisco telepresence_collaboration_endpoint 9.1.4
cisco telepresence_collaboration_endpoint 9.1.5
cisco telepresence_collaboration_endpoint 9.1.6
cisco telepresence_collaboration_endpoint 9.2.1
cisco telepresence_collaboration_endpoint 9.2.2
cisco telepresence_collaboration_endpoint 9.2.3
cisco telepresence_collaboration_endpoint 9.2.4
cisco telepresence_collaboration_endpoint 9.9.3
cisco telepresence_collaboration_endpoint 9.9.4
cisco telepresence_collaboration_endpoint 9.10.1
cisco telepresence_collaboration_endpoint 9.10.2
cisco telepresence_collaboration_endpoint 9.10.3
cisco telepresence_collaboration_endpoint 9.12.3
cisco telepresence_collaboration_endpoint 9.12.4
cisco telepresence_collaboration_endpoint 9.12.5
cisco telepresence_collaboration_endpoint 9.13.0
cisco telepresence_collaboration_endpoint 9.13.1
cisco telepresence_collaboration_endpoint 9.13.2
cisco telepresence_collaboration_endpoint 9.13.3
cisco telepresence_collaboration_endpoint 9.14.3
cisco telepresence_collaboration_endpoint 9.14.4
cisco telepresence_collaboration_endpoint 9.14.5
cisco telepresence_collaboration_endpoint 9.14.6
cisco telepresence_collaboration_endpoint 9.14.7
cisco telepresence_collaboration_endpoint 9.15.0.10
cisco telepresence_collaboration_endpoint 9.15.0.11
cisco telepresence_collaboration_endpoint 9.15.0.13
cisco telepresence_collaboration_endpoint 9.15.0.19
cisco telepresence_collaboration_endpoint 9.15.3.17
cisco telepresence_collaboration_endpoint 9.15.3.18
cisco telepresence_collaboration_endpoint 9.15.3.19
cisco telepresence_collaboration_endpoint 9.15.3.22
cisco telepresence_collaboration_endpoint 9.15.3.25
cisco telepresence_collaboration_endpoint 9.15.3.26
cisco telepresence_collaboration_endpoint 9.15.8.12
cisco telepresence_collaboration_endpoint 9.15.10.8
cisco telepresence_collaboration_endpoint 9.15.13.0
cisco roomos -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22AE6C0-3FDE-435E-BA25-2664A2B9758C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2E8E40-3B18-49A6-B78C-472B5D55039D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "67604778-41A3-4519-B526-4807EBD8E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F781A5E-C38E-4BE3-9F47-8B0392E6DEF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "479C49D0-5279-4054-8440-9683624AC057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42E4172-2723-426D-AE73-453C74961885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4770CB-A207-4D72-9EC0-2B6AEE9EC54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F248A6D4-23C6-4D6D-B972-D6F9E711B61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0559D1BB-51A9-4285-A845-ECB6A6B7D678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1ED50F6-B01C-4003-A797-109DA9A631FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3C7127-EE08-4212-92DF-C8D568F2A453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F86038-E6D2-4F6F-B768-68525833FD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C931235-9560-4186-A339-167DAB5B7E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABCAF219-6E5E-42BB-9892-B17D99634518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1A42D-D874-4DD4-BB08-AFFEE4EAD015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1785B2F-B319-403F-A106-9137B9D140BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C73AE384-CF1A-4D57-8E95-4E2D5DFB1E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB34F64-D33A-4C32-9D18-5CAF45CB1933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C05E7CB-5ABF-4F61-B6B8-03F46B91FBF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "906C8212-DD6A-4485-8629-EBEFC727C70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "758679DD-D282-4FDC-9D46-BF698660C789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F63CDD-D2B6-4FED-9C93-63AD60882EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A529A0C7-CCE3-4994-B412-0BEC7B4D2E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5CFE99-B3DB-429E-AEBA-3F863E29EDF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AEF4D9-06A3-4A15-B310-F3F2896B0992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "659220C8-4391-40C9-8047-8F761ECC58C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A16E86-C21B-42B6-88A9-AF3CF0957C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E025DD20-B097-4000-A005-BA89251EDB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DC02FB-1308-4505-BB12-BDBA971B48E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3A23C7-7BB6-4A18-AFCF-47F508FA3561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "26D6A017-E3C1-4F4F-AE1C-87B6FCBCA13B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0B6817-E340-4561-831F-119ED1229028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "46924C45-25B7-49B4-9AD3-5FC96548B012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3228575-1A10-41CA-8765-8CDEA1F68DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01B24DC-3BE4-497C-BE1C-1164020A12A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "449E53D2-C552-46DD-B924-C2F19C88F1F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "3800DAF9-E42F-474C-8C9C-F8A5934148D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "310C0A56-6523-42EB-8BF2-4C13969D057E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E93335-92B5-4EEC-8D79-952463ECBB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F349CFD5-D70F-426C-B670-156FD558E50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "83FE1690-CA64-4D12-8538-5FC0727ED553",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F10D2C6-D629-45E1-966F-AB9EAB4EDB03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in pairing process of Cisco\u0026nbsp;TelePresence CE Software and RoomOS Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device.\r\nThis vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el proceso de emparejamiento del software Cisco TelePresence CE y el software RoomOS para dispositivos Cisco Touch 10 podr\u00eda permitir que un atacante remoto no autenticado se haga pasar por un dispositivo leg\u00edtimo y se empareje con un dispositivo afectado. Esta vulnerabilidad se debe a una verificaci\u00f3n de identidad insuficiente. Un atacante podr\u00eda aprovechar esta vulnerabilidad haci\u00e9ndose pasar por un dispositivo leg\u00edtimo y respondiendo a la transmisi\u00f3n de emparejamiento de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder al dispositivo afectado mientras se hace pasar por un dispositivo leg\u00edtimo. No existen workarounds que aborden esta vulnerabilidad."
    }
  ],
  "id": "CVE-2022-20793",
  "lastModified": "2025-07-30T17:12:24.097",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-15T16:15:22.370",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-325"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2023-20008

Vulnerability from fkie_nvd - Published: 2023-01-20 07:15 - Updated: 2024-11-21 07:40
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
Impacted products
Vendor Product Version
cisco roomos 10.3.2.0
cisco roomos 10.3.4.0
cisco roomos 10.8.2.5
cisco roomos 10.8.4.0
cisco roomos 10.11.3.0
cisco roomos 10.11.5.2
cisco roomos 10.15.3.0
cisco telepresence_collaboration_endpoint 8.0.0
cisco telepresence_collaboration_endpoint 8.0.1
cisco telepresence_collaboration_endpoint 8.1.0
cisco telepresence_collaboration_endpoint 8.1.1
cisco telepresence_collaboration_endpoint 8.2.0
cisco telepresence_collaboration_endpoint 8.2.1
cisco telepresence_collaboration_endpoint 8.2.2
cisco telepresence_collaboration_endpoint 8.3.0
cisco telepresence_collaboration_endpoint 8.3.1
cisco telepresence_collaboration_endpoint 8.3.2
cisco telepresence_collaboration_endpoint 8.3.3
cisco telepresence_collaboration_endpoint 8.3.5
cisco telepresence_collaboration_endpoint 8.3.6
cisco telepresence_collaboration_endpoint 9.0.1
cisco telepresence_collaboration_endpoint 9.1.1
cisco telepresence_collaboration_endpoint 9.1.2
cisco telepresence_collaboration_endpoint 9.1.3
cisco telepresence_collaboration_endpoint 9.1.4
cisco telepresence_collaboration_endpoint 9.1.5
cisco telepresence_collaboration_endpoint 9.1.6
cisco telepresence_collaboration_endpoint 9.2.1
cisco telepresence_collaboration_endpoint 9.2.2
cisco telepresence_collaboration_endpoint 9.2.3
cisco telepresence_collaboration_endpoint 9.2.4
cisco telepresence_collaboration_endpoint 9.9.3
cisco telepresence_collaboration_endpoint 9.9.4
cisco telepresence_collaboration_endpoint 9.10.1
cisco telepresence_collaboration_endpoint 9.10.2
cisco telepresence_collaboration_endpoint 9.10.3
cisco telepresence_collaboration_endpoint 9.12.3
cisco telepresence_collaboration_endpoint 9.12.4
cisco telepresence_collaboration_endpoint 9.12.5
cisco telepresence_collaboration_endpoint 9.13.0
cisco telepresence_collaboration_endpoint 9.13.1
cisco telepresence_collaboration_endpoint 9.13.2
cisco telepresence_collaboration_endpoint 9.13.3
cisco telepresence_collaboration_endpoint 9.14.3
cisco telepresence_collaboration_endpoint 9.14.4
cisco telepresence_collaboration_endpoint 9.14.5
cisco telepresence_collaboration_endpoint 9.14.6
cisco telepresence_collaboration_endpoint 9.15.0.10
cisco telepresence_collaboration_endpoint 9.15.0.11
cisco telepresence_collaboration_endpoint 9.15.3.25
cisco telepresence_collaboration_endpoint 9.15.3.26
cisco telepresence_collaboration_endpoint 9.15.8.12
cisco telepresence_collaboration_endpoint 9.15.10.8
cisco telepresence_collaboration_endpoint 9.15.13.0
cisco telepresence_tc 7.3.5
cisco telepresence_tc 7.3.6
cisco telepresence_tc 7.3.7
cisco telepresence_tc 7.3.9
cisco telepresence_tc 7.3.13
cisco telepresence_tc 7.3.21

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D83C41B-DD92-4B31-B2B3-BD831B908E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "83093692-59FB-4C24-AF96-A76DFADD37C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.8.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3E919D-0686-4680-882C-7EB636EC1089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.8.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA427278-651C-47AB-996E-3B0BD307E34F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.11.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "293FE8EE-2C4E-4EA2-BBC7-680C08F45E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.11.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A27105-A41F-4814-BCA9-2DE3D1505D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.15.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB29E8E8-74BD-430E-A12E-E91E27FF81A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B79B19D-B749-4353-B366-3C6B5171AA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7846817-340F-49CF-AA2E-ACBE2BCC854C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7BA8275-E3B9-4901-A4AF-F3CB713C6740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9840947F-758C-4A97-B9D2-A9F1B414D6FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF1A6F-9CDD-41E6-835A-41B06A9078EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50221CF-D98B-44CC-B60F-7C095D29F844",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0783DDF5-520C-470C-ACA1-A2E6871E2F14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDF553F-4945-43EB-9D87-2AD8464EE7BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE000291-6A76-40D1-A4AA-DEC5DD995F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B11A1A-6EB5-4234-82D9-DCBD7E21EAD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB53A45A-2B87-4104-85D5-96EFD4EBAF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C672A9A-3AD3-44B3-B8BE-1EA3A5AE9D2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2B1C53-EAB4-44D7-80B1-EBF564DEF664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22AE6C0-3FDE-435E-BA25-2664A2B9758C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2E8E40-3B18-49A6-B78C-472B5D55039D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "67604778-41A3-4519-B526-4807EBD8E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F781A5E-C38E-4BE3-9F47-8B0392E6DEF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "479C49D0-5279-4054-8440-9683624AC057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42E4172-2723-426D-AE73-453C74961885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4770CB-A207-4D72-9EC0-2B6AEE9EC54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F248A6D4-23C6-4D6D-B972-D6F9E711B61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0559D1BB-51A9-4285-A845-ECB6A6B7D678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1ED50F6-B01C-4003-A797-109DA9A631FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3C7127-EE08-4212-92DF-C8D568F2A453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F86038-E6D2-4F6F-B768-68525833FD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C931235-9560-4186-A339-167DAB5B7E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABCAF219-6E5E-42BB-9892-B17D99634518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1A42D-D874-4DD4-BB08-AFFEE4EAD015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1785B2F-B319-403F-A106-9137B9D140BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C73AE384-CF1A-4D57-8E95-4E2D5DFB1E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB34F64-D33A-4C32-9D18-5CAF45CB1933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C05E7CB-5ABF-4F61-B6B8-03F46B91FBF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "906C8212-DD6A-4485-8629-EBEFC727C70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "758679DD-D282-4FDC-9D46-BF698660C789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F63CDD-D2B6-4FED-9C93-63AD60882EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A529A0C7-CCE3-4994-B412-0BEC7B4D2E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5CFE99-B3DB-429E-AEBA-3F863E29EDF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AEF4D9-06A3-4A15-B310-F3F2896B0992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "659220C8-4391-40C9-8047-8F761ECC58C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A16E86-C21B-42B6-88A9-AF3CF0957C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DC02FB-1308-4505-BB12-BDBA971B48E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3A23C7-7BB6-4A18-AFCF-47F508FA3561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "3800DAF9-E42F-474C-8C9C-F8A5934148D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "310C0A56-6523-42EB-8BF2-4C13969D057E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E93335-92B5-4EEC-8D79-952463ECBB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F349CFD5-D70F-426C-B670-156FD558E50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "83FE1690-CA64-4D12-8538-5FC0727ED553",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc:7.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "05922155-725D-4695-B7BF-3BEA4A0D418B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc:7.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8692F9C-D9C1-412A-8CA0-04DA37509819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc:7.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E73BF2C9-F26F-471C-A566-8EE06FECBB7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc:7.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "604336DF-DDE2-4250-8CA4-3800EB9F935A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc:7.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "191F7E36-58D5-411F-8D45-C4F225A35B63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc:7.3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1436BE5E-2EC2-4FDF-BDAE-AF590D36C838",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\r\n\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la CLI de Cisco TelePresence CE y el software RoomOS podr\u00eda permitir que un atacante local autenticado sobrescriba archivos arbitrarios en el sistema local de un dispositivo afectado. Esta vulnerabilidad se debe a controles de acceso inadecuados a archivos que se encuentran en el sistema de archivos local. Un atacante podr\u00eda aprovechar esta vulnerabilidad colocando un enlace simb\u00f3lico en una ubicaci\u00f3n espec\u00edfica del sistema de archivos local de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante sobrescribir archivos arbitrarios en el dispositivo afectado."
    }
  ],
  "id": "CVE-2023-20008",
  "lastModified": "2024-11-21T07:40:19.863",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-01-20T07:15:13.057",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-20002

Vulnerability from fkie_nvd - Published: 2023-01-20 07:15 - Updated: 2024-11-21 07:40
Summary
A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system.
Impacted products
Vendor Product Version
cisco roomos 10.3.2.0
cisco roomos 10.3.4.0
cisco roomos 10.8.2.5
cisco roomos 10.8.4.0
cisco roomos 10.11.3.0
cisco roomos 10.11.5.2
cisco roomos 10.15.3.0
cisco telepresence_collaboration_endpoint 8.1.1
cisco telepresence_collaboration_endpoint 8.3.0
cisco telepresence_collaboration_endpoint 8.3.5
cisco telepresence_collaboration_endpoint 9.0.1
cisco telepresence_collaboration_endpoint 9.1.1
cisco telepresence_collaboration_endpoint 9.1.2
cisco telepresence_collaboration_endpoint 9.1.3
cisco telepresence_collaboration_endpoint 9.1.4
cisco telepresence_collaboration_endpoint 9.1.5
cisco telepresence_collaboration_endpoint 9.1.6
cisco telepresence_collaboration_endpoint 9.2.1
cisco telepresence_collaboration_endpoint 9.2.2
cisco telepresence_collaboration_endpoint 9.2.3
cisco telepresence_collaboration_endpoint 9.2.4
cisco telepresence_collaboration_endpoint 9.9.3
cisco telepresence_collaboration_endpoint 9.9.4
cisco telepresence_collaboration_endpoint 9.10.1
cisco telepresence_collaboration_endpoint 9.10.2
cisco telepresence_collaboration_endpoint 9.10.3
cisco telepresence_collaboration_endpoint 9.12.3
cisco telepresence_collaboration_endpoint 9.12.4
cisco telepresence_collaboration_endpoint 9.12.5
cisco telepresence_collaboration_endpoint 9.13.0
cisco telepresence_collaboration_endpoint 9.13.1
cisco telepresence_collaboration_endpoint 9.13.2
cisco telepresence_collaboration_endpoint 9.13.3
cisco telepresence_collaboration_endpoint 9.14.3
cisco telepresence_collaboration_endpoint 9.14.4
cisco telepresence_collaboration_endpoint 9.14.5
cisco telepresence_collaboration_endpoint 9.14.6
cisco telepresence_collaboration_endpoint 9.15.0.10
cisco telepresence_collaboration_endpoint 9.15.0.11
cisco telepresence_collaboration_endpoint 9.15.3.25
cisco telepresence_collaboration_endpoint 9.15.3.26
cisco telepresence_collaboration_endpoint 9.15.10.8

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D83C41B-DD92-4B31-B2B3-BD831B908E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "83093692-59FB-4C24-AF96-A76DFADD37C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.8.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3E919D-0686-4680-882C-7EB636EC1089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.8.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA427278-651C-47AB-996E-3B0BD307E34F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.11.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "293FE8EE-2C4E-4EA2-BBC7-680C08F45E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.11.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A27105-A41F-4814-BCA9-2DE3D1505D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:10.15.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB29E8E8-74BD-430E-A12E-E91E27FF81A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9840947F-758C-4A97-B9D2-A9F1B414D6FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDF553F-4945-43EB-9D87-2AD8464EE7BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C672A9A-3AD3-44B3-B8BE-1EA3A5AE9D2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22AE6C0-3FDE-435E-BA25-2664A2B9758C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2E8E40-3B18-49A6-B78C-472B5D55039D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "67604778-41A3-4519-B526-4807EBD8E61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F781A5E-C38E-4BE3-9F47-8B0392E6DEF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "479C49D0-5279-4054-8440-9683624AC057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42E4172-2723-426D-AE73-453C74961885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4770CB-A207-4D72-9EC0-2B6AEE9EC54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F248A6D4-23C6-4D6D-B972-D6F9E711B61F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0559D1BB-51A9-4285-A845-ECB6A6B7D678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1ED50F6-B01C-4003-A797-109DA9A631FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3C7127-EE08-4212-92DF-C8D568F2A453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F86038-E6D2-4F6F-B768-68525833FD8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C931235-9560-4186-A339-167DAB5B7E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABCAF219-6E5E-42BB-9892-B17D99634518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA1A42D-D874-4DD4-BB08-AFFEE4EAD015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1785B2F-B319-403F-A106-9137B9D140BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C73AE384-CF1A-4D57-8E95-4E2D5DFB1E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB34F64-D33A-4C32-9D18-5CAF45CB1933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C05E7CB-5ABF-4F61-B6B8-03F46B91FBF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "906C8212-DD6A-4485-8629-EBEFC727C70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "758679DD-D282-4FDC-9D46-BF698660C789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6F63CDD-D2B6-4FED-9C93-63AD60882EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A529A0C7-CCE3-4994-B412-0BEC7B4D2E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5CFE99-B3DB-429E-AEBA-3F863E29EDF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AEF4D9-06A3-4A15-B310-F3F2896B0992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "659220C8-4391-40C9-8047-8F761ECC58C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A16E86-C21B-42B6-88A9-AF3CF0957C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DC02FB-1308-4505-BB12-BDBA971B48E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3A23C7-7BB6-4A18-AFCF-47F508FA3561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "3800DAF9-E42F-474C-8C9C-F8A5934148D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "310C0A56-6523-42EB-8BF2-4C13969D057E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F349CFD5-D70F-426C-B670-156FD558E50F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en Cisco TelePresence CE y el software RoomOS podr\u00eda permitir que un atacante local autenticado evite los controles de acceso y realice un ataque SSRF a trav\u00e9s de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n inadecuada de la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud manipulada a un usuario de la aplicaci\u00f3n web. Un exploit exitoso podr\u00eda permitir al atacante enviar solicitudes de red arbitrarias provenientes del sistema afectado."
    }
  ],
  "id": "CVE-2023-20002",
  "lastModified": "2024-11-21T07:40:19.027",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.5,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-01-20T07:15:12.450",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20954

Vulnerability from fkie_nvd - Published: 2022-10-26 15:15 - Updated: 2024-11-21 06:43
Summary
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E40E27-6D2C-4861-951A-2F87860E9980",
              "versionEndExcluding": "10.19.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F10D2C6-D629-45E1-966F-AB9EAB4EDB03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
    },
    {
      "lang": "es",
      "value": "Varias vulnerabilidades en el software Cisco TelePresence Collaboration Endpoint (CE) y en el software Cisco RoomOS podr\u00edan permitir a un atacante conducir ataques de salto de ruta, visualizar datos confidenciales o escribir archivos arbitrarios en un dispositivo afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
    }
  ],
  "id": "CVE-2022-20954",
  "lastModified": "2024-11-21T06:43:54.497",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 4.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-10-26T15:15:15.017",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20955

Vulnerability from fkie_nvd - Published: 2022-10-26 15:15 - Updated: 2024-11-21 06:43
Summary
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E40E27-6D2C-4861-951A-2F87860E9980",
              "versionEndExcluding": "10.19.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F10D2C6-D629-45E1-966F-AB9EAB4EDB03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades en el software Cisco TelePresence Collaboration Endpoint (CE) y el software Cisco RoomOS podr\u00edan permitir a un atacante conducir ataques de salto de ruta, visualizar datos confidenciales o escribir archivos arbitrarios en un dispositivo afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
    }
  ],
  "id": "CVE-2022-20955",
  "lastModified": "2024-11-21T06:43:54.603",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 4.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-10-26T15:15:15.117",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20953

Vulnerability from fkie_nvd - Published: 2022-10-26 15:15 - Updated: 2024-11-21 06:43
Summary
Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E40E27-6D2C-4861-951A-2F87860E9980",
              "versionEndExcluding": "10.19.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F10D2C6-D629-45E1-966F-AB9EAB4EDB03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
    },
    {
      "lang": "es",
      "value": "Varias vulnerabilidades en el software Cisco TelePresence Collaboration Endpoint (CE) y en el software Cisco RoomOS podr\u00edan permitir a un atacante conducir ataques de salto de ruta, visualizar datos confidenciales o escribir archivos arbitrarios en un dispositivo afectado. Para m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
    }
  ],
  "id": "CVE-2022-20953",
  "lastModified": "2024-11-21T06:43:54.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 4.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-10-26T15:15:14.800",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-trav-beFvCcyu"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2025-20329 (GCVE-0-2025-20329)

Vulnerability from cvelistv5 – Published: 2025-10-15 16:14 – Updated: 2025-10-15 17:42
VLAI?
Summary
A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII). Note: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials.
CWE
  • CWE-532 - Insertion of Sensitive Information into Log File
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: RoomOS 10.11.2.2
Affected: RoomOS 10.15.2.2
Affected: RoomOS 11.5.4.6
Affected: RoomOS 11.5.2.4
Affected: RoomOS 10.8.2.5
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.15.5.3
Affected: RoomOS 10.19.2.2
Affected: RoomOS 11.1.3.1
Affected: RoomOS 10.11.6.0
Affected: RoomOS 10.19.3.0
Affected: RoomOS 10.19.4.2
Affected: RoomOS 10.3.2.4
Affected: RoomOS 10.3.4.0
Affected: RoomOS 10.15.3.0
Affected: RoomOS 11.1.4.1
Affected: RoomOS 11.14.2.3
Affected: RoomOS 11.1.2.4
Affected: RoomOS 10.8.3.1
Affected: RoomOS 11.14.2.1
Affected: RoomOS 10.3.3.0
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.15.4.1
Affected: RoomOS 10.19.5.6
Affected: RoomOS 10.11.4.1
Affected: RoomOS 11.9.3.1
Affected: RoomOS 11.5.3.3
Affected: RoomOS 10.3.2.0
Affected: RoomOS 11.9.2.4
Affected: RoomOS 11.14.3.0
Affected: RoomOS 11.17.2.2
Affected: RoomOS 11.14.4.0
Affected: RoomOS 10.19 StepUpg
Affected: RoomOS 11.17.3.0
Affected: RoomOS 11.20.2.3
Affected: RoomOS 11.14.5.0
Affected: RoomOS 11.17.4.0
Affected: RoomOS 11.20.3.0
Affected: RoomOS 11.23.1.6
Affected: RoomOS 11.23.1.8
Affected: RoomOS 11.24.1.5
Affected: RoomOS 11.24.2.4
Affected: RoomOS 11.24.3.0
Affected: RoomOS 11.24.4.1
Affected: RoomOS 11.27.2.0
Affected: RoomOS 11.28.1.3
Affected: RoomOS 11.27.3.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20329",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-15T17:42:38.688864Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-15T17:42:48.088Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "RoomOS 10.11.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.5.4.6"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.5.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.2.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.5.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.1.3.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.6.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.4.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.1.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.2.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.1.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.3.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.2.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.5.6"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.9.3.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.5.3.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.9.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.17.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19 StepUpg"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.17.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.20.2.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.5.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.17.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.20.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.23.1.6"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.23.1.8"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.1.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.27.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.28.1.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.27.3.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative\u0026nbsp;credentials.\r\n\r\nThis vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII).\r\nNote: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-15T16:14:59.904Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-inf-disc-qGgsbxAm",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-inf-disc-qGgsbxAm"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-inf-disc-qGgsbxAm",
        "defects": [
          "CSCwp08812"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20329",
    "datePublished": "2025-10-15T16:14:59.904Z",
    "dateReserved": "2024-10-10T19:15:13.254Z",
    "dateUpdated": "2025-10-15T17:42:48.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20793 (GCVE-0-2022-20793)

Vulnerability from cvelistv5 – Published: 2024-11-15 15:34 – Updated: 2024-11-15 21:12
VLAI?
Summary
A vulnerability in pairing process of Cisco TelePresence CE Software and RoomOS Software for Cisco Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device. This vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability.
CWE
  • CWE-325 - Missing Required Cryptographic Step
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: N/A
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.1.6
Affected: CE9.12.3
Affected: CE9.13.1
Affected: CE9.12.4
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.0.1
Affected: CE9.2.2
Affected: CE9.1.2
Affected: CE9.9.3
Affected: CE9.2.4
Affected: CE9.2.3
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "roomos",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_tc_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_ce_software:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_ce_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20793",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T21:07:36.103341Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T21:12:23.388Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in pairing process of Cisco\u0026nbsp;TelePresence CE Software and RoomOS Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device.\r\nThis vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-325",
              "description": "Missing Required Cryptographic Step",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:34:33.919Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-CTT-IVV-4A66Dsfj",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj"
        }
      ],
      "source": {
        "advisory": "cisco-sa-CTT-IVV-4A66Dsfj",
        "defects": [
          "CSCvw08723"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Touch 10 Device Insufficient Identity Verification Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20793",
    "datePublished": "2024-11-15T15:34:33.919Z",
    "dateReserved": "2021-11-02T13:28:29.168Z",
    "dateUpdated": "2024-11-15T21:12:23.388Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20931 (GCVE-0-2022-20931)

Vulnerability from cvelistv5 – Published: 2024-11-15 15:30 – Updated: 2024-11-15 15:47
VLAI?
Summary
A vulnerability in the version control of Cisco TelePresence CE Software for Cisco Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device. This vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-527 - Exposure of Version-Control Repository to an Unauthorized Control Sphere
Assigner
Impacted products
Vendor Product Version
Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20931",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:47:05.719923Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:47:25.217Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the version control of Cisco\u0026nbsp;TelePresence CE Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device.\r\nThis vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco\u0026nbsp;TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-527",
              "description": "Exposure of Version-Control Repository to an Unauthorized Control Sphere",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:30:29.164Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-CTT-DAV-HSvEHHEt",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-CTT-DAV-HSvEHHEt",
        "defects": [
          "CSCvw12012"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Touch 10 Device Downgrade Attack Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20931",
    "datePublished": "2024-11-15T15:30:29.164Z",
    "dateReserved": "2021-11-02T13:28:29.192Z",
    "dateUpdated": "2024-11-15T15:47:25.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20004 (GCVE-0-2023-20004)

Vulnerability from cvelistv5 – Published: 2024-11-15 15:23 – Updated: 2024-11-15 15:37
VLAI?
Summary
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: N/A
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Affected: CE9.15.15.4
Affected: CE9.15.16.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20004",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:37:09.280084Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:37:26.021Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.15.4"
            },
            {
              "status": "affected",
              "version": "CE9.15.16.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:23:29.140Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwc47206"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Write Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20004",
    "datePublished": "2024-11-15T15:23:29.140Z",
    "dateReserved": "2022-10-27T18:47:50.305Z",
    "dateUpdated": "2024-11-15T15:37:26.021Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20090 (GCVE-0-2023-20090)

Vulnerability from cvelistv5 – Published: 2024-11-15 15:19 – Updated: 2024-11-15 17:15
VLAI?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-27 - Path Traversal: 'dir/../../filename'
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: N/A
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Affected: CE9.15.15.4
Affected: CE9.15.16.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_collaboration_endpoint",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "9.0.1"
              },
              {
                "status": "affected",
                "version": "9.10.1"
              },
              {
                "status": "affected",
                "version": "9.10.2"
              },
              {
                "status": "affected",
                "version": "9.10.3"
              },
              {
                "status": "affected",
                "version": "9.1.1"
              },
              {
                "status": "affected",
                "version": "9.1.2"
              },
              {
                "status": "affected",
                "version": "9.12.3"
              },
              {
                "status": "affected",
                "version": "9.12.4"
              },
              {
                "status": "affected",
                "version": "9.12.5"
              },
              {
                "status": "affected",
                "version": "9.1.3"
              },
              {
                "status": "affected",
                "version": "9.13.0"
              },
              {
                "status": "affected",
                "version": "9.13.1"
              },
              {
                "status": "affected",
                "version": "9.13.2"
              },
              {
                "status": "affected",
                "version": "9.13.3"
              },
              {
                "status": "affected",
                "version": "9.1.4"
              },
              {
                "status": "affected",
                "version": "9.14.3"
              },
              {
                "status": "affected",
                "version": "9.14.4"
              },
              {
                "status": "affected",
                "version": "9.14.5"
              },
              {
                "status": "affected",
                "version": "9.14.6"
              },
              {
                "status": "affected",
                "version": "9.1.5"
              },
              {
                "status": "affected",
                "version": "9.15.0.10"
              },
              {
                "status": "affected",
                "version": "9.15.0.11"
              },
              {
                "status": "affected",
                "version": "9.15.13.0"
              },
              {
                "status": "affected",
                "version": "9.15.8.12"
              },
              {
                "status": "affected",
                "version": "9.1.6"
              },
              {
                "status": "affected",
                "version": "9.2.1"
              },
              {
                "status": "affected",
                "version": "9.2.2"
              },
              {
                "status": "affected",
                "version": "9.2.3"
              },
              {
                "status": "affected",
                "version": "9.2.4"
              },
              {
                "status": "affected",
                "version": "9.9.3"
              },
              {
                "status": "affected",
                "version": "9.9.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.19:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.15.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.16.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.18:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.19:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.22:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_collaboration_endpoint",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "9.15.0.19"
              },
              {
                "status": "affected",
                "version": "9.15.10.8"
              },
              {
                "status": "affected",
                "version": "9.15.13.0"
              },
              {
                "status": "affected",
                "version": "9.15.15.4"
              },
              {
                "status": "affected",
                "version": "9.15.16.5"
              },
              {
                "status": "affected",
                "version": "9.15.3.18"
              },
              {
                "status": "affected",
                "version": "9.15.3.19"
              },
              {
                "status": "affected",
                "version": "9.15.3.22"
              },
              {
                "status": "affected",
                "version": "9.15.3.25"
              },
              {
                "status": "affected",
                "version": "9.15.3.26"
              },
              {
                "status": "affected",
                "version": "9.15.8.12"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20090",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:49:25.857316Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:15:43.778Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.15.4"
            },
            {
              "status": "affected",
              "version": "CE9.15.16.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-27",
              "description": "Path Traversal: \u0027dir/../../filename\u0027",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:19:09.891Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwc85883"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20090",
    "datePublished": "2024-11-15T15:19:09.891Z",
    "dateReserved": "2022-10-27T18:47:50.335Z",
    "dateUpdated": "2024-11-15T17:15:43.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20091 (GCVE-0-2023-20091)

Vulnerability from cvelistv5 – Published: 2024-11-15 15:15 – Updated: 2024-11-15 17:48
VLAI?
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-61 - UNIX Symbolic Link (Symlink) Following
Assigner
Impacted products
Vendor Product Version
Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Affected: CE9.15.15.4
Affected: CE9.15.16.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20091",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T17:47:56.924902Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:48:19.183Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.15.4"
            },
            {
              "status": "affected",
              "version": "CE9.15.16.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-61",
              "description": "UNIX Symbolic Link (Symlink) Following",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:15:03.615Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwc71178"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20091",
    "datePublished": "2024-11-15T15:15:03.615Z",
    "dateReserved": "2022-10-27T18:47:50.336Z",
    "dateUpdated": "2024-11-15T17:48:19.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20094 (GCVE-0-2023-20094)

Vulnerability from cvelistv5 – Published: 2024-11-15 15:08 – Updated: 2024-11-15 15:43
VLAI?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device. This vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information. Note: This vulnerability only affects Cisco Webex Desk Hub. There are no workarounds that address this vulnerability.
CWE
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20094",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:43:09.416209Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:43:30.207Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.\r\n\r\nThis vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.\r\nNote: This vulnerability only affects Cisco Webex Desk Hub.\r\nThere are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "Out-of-bounds Read",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:08:14.206Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwb86296"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20094",
    "datePublished": "2024-11-15T15:08:04.290Z",
    "dateReserved": "2022-10-27T18:47:50.336Z",
    "dateUpdated": "2024-11-15T15:43:30.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20008 (GCVE-0-2023-20008)

Vulnerability from cvelistv5 – Published: 2023-01-19 01:41 – Updated: 2024-08-02 08:57
VLAI?
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: RoomOS 10.3.2.0
Affected: RoomOS 10.3.4.0
Affected: RoomOS 10.8.2.5
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.15.3.0
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.0.1
Affected: CE9.1.1
Affected: CE9.1.2
Affected: CE9.1.3
Affected: CE9.1.4
Affected: CE9.1.5
Affected: CE9.1.6
Affected: CE9.10.1
Affected: CE9.10.2
Affected: CE9.10.3
Affected: CE9.12.4
Affected: CE9.12.5
Affected: CE9.12.3
Affected: CE9.13.0
Affected: CE9.13.1
Affected: CE9.13.3
Affected: CE9.13.2
Affected: CE9.2.1
Affected: CE9.2.2
Affected: CE9.2.3
Affected: CE9.2.4
Affected: CE9.9.3
Affected: CE9.9.4
Affected: CE9.14.3
Affected: CE9.14.5
Affected: CE9.14.4
Affected: CE9.14.6
Affected: CE9.14.7
Affected: CE9.15.0.11
Affected: CE9.15.0.10
Affected: CE9.15.8.12
Affected: CE9.15.13.0
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.3.17
Affected: CE9.15.3.22
Affected: CE9.15.0.19
Affected: TC7.3.21
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.15.3.0
Affected: 9.15.3.25
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.552Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-roomos-dkjGFgRK",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.2.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            }
          ]
        },
        {
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "TC7.3.21"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            },
            {
              "status": "affected",
              "version": "9.15.3.25"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\r\n\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:57:30.027Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-dkjGFgRK",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-dkjGFgRK",
        "defects": [
          "CSCwc47201"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20008",
    "datePublished": "2023-01-19T01:41:03.629Z",
    "dateReserved": "2022-10-27T18:47:50.307Z",
    "dateUpdated": "2024-08-02T08:57:35.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20002 (GCVE-0-2023-20002)

Vulnerability from cvelistv5 – Published: 2023-01-19 01:40 – Updated: 2024-08-02 08:57
VLAI?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: RoomOS 10.3.2.0
Affected: RoomOS 10.3.4.0
Affected: RoomOS 10.8.2.5
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.15.3.0
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.0.1
Affected: CE9.1.1
Affected: CE9.1.2
Affected: CE9.1.3
Affected: CE9.1.4
Affected: CE9.1.5
Affected: CE9.1.6
Affected: CE9.10.1
Affected: CE9.10.2
Affected: CE9.10.3
Affected: CE9.12.4
Affected: CE9.12.5
Affected: CE9.12.3
Affected: CE9.13.0
Affected: CE9.13.1
Affected: CE9.13.3
Affected: CE9.13.2
Affected: CE9.2.1
Affected: CE9.2.2
Affected: CE9.2.3
Affected: CE9.2.4
Affected: CE9.9.3
Affected: CE9.9.4
Affected: CE9.14.3
Affected: CE9.14.5
Affected: CE9.14.4
Affected: CE9.14.6
Affected: CE9.14.7
Affected: CE9.15.0.11
Affected: CE9.15.0.10
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.3.17
Affected: CE9.15.3.22
Affected: CE9.15.0.19
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.15.3.0
Affected: 9.15.3.25
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.143Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-roomos-dkjGFgRK",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.2.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            }
          ]
        },
        {
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            },
            {
              "status": "affected",
              "version": "9.15.3.25"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:57:28.759Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-dkjGFgRK",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-dkjGFgRK",
        "defects": [
          "CSCwc85914"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20002",
    "datePublished": "2023-01-19T01:40:44.838Z",
    "dateReserved": "2022-10-27T18:47:50.305Z",
    "dateUpdated": "2024-08-02T08:57:35.143Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20329 (GCVE-0-2025-20329)

Vulnerability from nvd – Published: 2025-10-15 16:14 – Updated: 2025-10-15 17:42
VLAI?
Summary
A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII). Note: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials.
CWE
  • CWE-532 - Insertion of Sensitive Information into Log File
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: RoomOS 10.11.2.2
Affected: RoomOS 10.15.2.2
Affected: RoomOS 11.5.4.6
Affected: RoomOS 11.5.2.4
Affected: RoomOS 10.8.2.5
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.15.5.3
Affected: RoomOS 10.19.2.2
Affected: RoomOS 11.1.3.1
Affected: RoomOS 10.11.6.0
Affected: RoomOS 10.19.3.0
Affected: RoomOS 10.19.4.2
Affected: RoomOS 10.3.2.4
Affected: RoomOS 10.3.4.0
Affected: RoomOS 10.15.3.0
Affected: RoomOS 11.1.4.1
Affected: RoomOS 11.14.2.3
Affected: RoomOS 11.1.2.4
Affected: RoomOS 10.8.3.1
Affected: RoomOS 11.14.2.1
Affected: RoomOS 10.3.3.0
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.15.4.1
Affected: RoomOS 10.19.5.6
Affected: RoomOS 10.11.4.1
Affected: RoomOS 11.9.3.1
Affected: RoomOS 11.5.3.3
Affected: RoomOS 10.3.2.0
Affected: RoomOS 11.9.2.4
Affected: RoomOS 11.14.3.0
Affected: RoomOS 11.17.2.2
Affected: RoomOS 11.14.4.0
Affected: RoomOS 10.19 StepUpg
Affected: RoomOS 11.17.3.0
Affected: RoomOS 11.20.2.3
Affected: RoomOS 11.14.5.0
Affected: RoomOS 11.17.4.0
Affected: RoomOS 11.20.3.0
Affected: RoomOS 11.23.1.6
Affected: RoomOS 11.23.1.8
Affected: RoomOS 11.24.1.5
Affected: RoomOS 11.24.2.4
Affected: RoomOS 11.24.3.0
Affected: RoomOS 11.24.4.1
Affected: RoomOS 11.27.2.0
Affected: RoomOS 11.28.1.3
Affected: RoomOS 11.27.3.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20329",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-15T17:42:38.688864Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-15T17:42:48.088Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "RoomOS 10.11.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.5.4.6"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.5.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.2.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.5.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.1.3.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.6.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.4.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.1.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.2.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.1.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.3.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.2.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19.5.6"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.9.3.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.5.3.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.9.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.17.2.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.19 StepUpg"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.17.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.20.2.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.14.5.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.17.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.20.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.23.1.6"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.23.1.8"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.1.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.2.4"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.24.4.1"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.27.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.28.1.3"
            },
            {
              "status": "affected",
              "version": "RoomOS 11.27.3.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative\u0026nbsp;credentials.\r\n\r\nThis vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII).\r\nNote: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-15T16:14:59.904Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-inf-disc-qGgsbxAm",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-inf-disc-qGgsbxAm"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-inf-disc-qGgsbxAm",
        "defects": [
          "CSCwp08812"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20329",
    "datePublished": "2025-10-15T16:14:59.904Z",
    "dateReserved": "2024-10-10T19:15:13.254Z",
    "dateUpdated": "2025-10-15T17:42:48.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20793 (GCVE-0-2022-20793)

Vulnerability from nvd – Published: 2024-11-15 15:34 – Updated: 2024-11-15 21:12
VLAI?
Summary
A vulnerability in pairing process of Cisco TelePresence CE Software and RoomOS Software for Cisco Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device. This vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability.
CWE
  • CWE-325 - Missing Required Cryptographic Step
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: N/A
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.1.6
Affected: CE9.12.3
Affected: CE9.13.1
Affected: CE9.12.4
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.0.1
Affected: CE9.2.2
Affected: CE9.1.2
Affected: CE9.9.3
Affected: CE9.2.4
Affected: CE9.2.3
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "roomos",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_tc_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_ce_software:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_ce_software",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20793",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T21:07:36.103341Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T21:12:23.388Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in pairing process of Cisco\u0026nbsp;TelePresence CE Software and RoomOS Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device.\r\nThis vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-325",
              "description": "Missing Required Cryptographic Step",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:34:33.919Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-CTT-IVV-4A66Dsfj",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj"
        }
      ],
      "source": {
        "advisory": "cisco-sa-CTT-IVV-4A66Dsfj",
        "defects": [
          "CSCvw08723"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Touch 10 Device Insufficient Identity Verification Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20793",
    "datePublished": "2024-11-15T15:34:33.919Z",
    "dateReserved": "2021-11-02T13:28:29.168Z",
    "dateUpdated": "2024-11-15T21:12:23.388Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20931 (GCVE-0-2022-20931)

Vulnerability from nvd – Published: 2024-11-15 15:30 – Updated: 2024-11-15 15:47
VLAI?
Summary
A vulnerability in the version control of Cisco TelePresence CE Software for Cisco Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device. This vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-527 - Exposure of Version-Control Repository to an Unauthorized Control Sphere
Assigner
Impacted products
Vendor Product Version
Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20931",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:47:05.719923Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:47:25.217Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the version control of Cisco\u0026nbsp;TelePresence CE Software for Cisco\u0026nbsp;Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device.\r\nThis vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco\u0026nbsp;TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-527",
              "description": "Exposure of Version-Control Repository to an Unauthorized Control Sphere",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:30:29.164Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-CTT-DAV-HSvEHHEt",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-CTT-DAV-HSvEHHEt",
        "defects": [
          "CSCvw12012"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Touch 10 Device Downgrade Attack Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20931",
    "datePublished": "2024-11-15T15:30:29.164Z",
    "dateReserved": "2021-11-02T13:28:29.192Z",
    "dateUpdated": "2024-11-15T15:47:25.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20004 (GCVE-0-2023-20004)

Vulnerability from nvd – Published: 2024-11-15 15:23 – Updated: 2024-11-15 15:37
VLAI?
Summary
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: N/A
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Affected: CE9.15.15.4
Affected: CE9.15.16.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20004",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:37:09.280084Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:37:26.021Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.15.4"
            },
            {
              "status": "affected",
              "version": "CE9.15.16.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:23:29.140Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwc47206"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Write Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20004",
    "datePublished": "2024-11-15T15:23:29.140Z",
    "dateReserved": "2022-10-27T18:47:50.305Z",
    "dateUpdated": "2024-11-15T15:37:26.021Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20090 (GCVE-0-2023-20090)

Vulnerability from nvd – Published: 2024-11-15 15:19 – Updated: 2024-11-15 17:15
VLAI?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-27 - Path Traversal: 'dir/../../filename'
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: N/A
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Affected: CE9.15.15.4
Affected: CE9.15.16.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_collaboration_endpoint",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "9.0.1"
              },
              {
                "status": "affected",
                "version": "9.10.1"
              },
              {
                "status": "affected",
                "version": "9.10.2"
              },
              {
                "status": "affected",
                "version": "9.10.3"
              },
              {
                "status": "affected",
                "version": "9.1.1"
              },
              {
                "status": "affected",
                "version": "9.1.2"
              },
              {
                "status": "affected",
                "version": "9.12.3"
              },
              {
                "status": "affected",
                "version": "9.12.4"
              },
              {
                "status": "affected",
                "version": "9.12.5"
              },
              {
                "status": "affected",
                "version": "9.1.3"
              },
              {
                "status": "affected",
                "version": "9.13.0"
              },
              {
                "status": "affected",
                "version": "9.13.1"
              },
              {
                "status": "affected",
                "version": "9.13.2"
              },
              {
                "status": "affected",
                "version": "9.13.3"
              },
              {
                "status": "affected",
                "version": "9.1.4"
              },
              {
                "status": "affected",
                "version": "9.14.3"
              },
              {
                "status": "affected",
                "version": "9.14.4"
              },
              {
                "status": "affected",
                "version": "9.14.5"
              },
              {
                "status": "affected",
                "version": "9.14.6"
              },
              {
                "status": "affected",
                "version": "9.1.5"
              },
              {
                "status": "affected",
                "version": "9.15.0.10"
              },
              {
                "status": "affected",
                "version": "9.15.0.11"
              },
              {
                "status": "affected",
                "version": "9.15.13.0"
              },
              {
                "status": "affected",
                "version": "9.15.8.12"
              },
              {
                "status": "affected",
                "version": "9.1.6"
              },
              {
                "status": "affected",
                "version": "9.2.1"
              },
              {
                "status": "affected",
                "version": "9.2.2"
              },
              {
                "status": "affected",
                "version": "9.2.3"
              },
              {
                "status": "affected",
                "version": "9.2.4"
              },
              {
                "status": "affected",
                "version": "9.9.3"
              },
              {
                "status": "affected",
                "version": "9.9.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.19:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.15.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.16.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.18:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.19:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.22:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "telepresence_collaboration_endpoint",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "9.15.0.19"
              },
              {
                "status": "affected",
                "version": "9.15.10.8"
              },
              {
                "status": "affected",
                "version": "9.15.13.0"
              },
              {
                "status": "affected",
                "version": "9.15.15.4"
              },
              {
                "status": "affected",
                "version": "9.15.16.5"
              },
              {
                "status": "affected",
                "version": "9.15.3.18"
              },
              {
                "status": "affected",
                "version": "9.15.3.19"
              },
              {
                "status": "affected",
                "version": "9.15.3.22"
              },
              {
                "status": "affected",
                "version": "9.15.3.25"
              },
              {
                "status": "affected",
                "version": "9.15.3.26"
              },
              {
                "status": "affected",
                "version": "9.15.8.12"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20090",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:49:25.857316Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:15:43.778Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.15.4"
            },
            {
              "status": "affected",
              "version": "CE9.15.16.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-27",
              "description": "Path Traversal: \u0027dir/../../filename\u0027",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:19:09.891Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwc85883"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20090",
    "datePublished": "2024-11-15T15:19:09.891Z",
    "dateReserved": "2022-10-27T18:47:50.335Z",
    "dateUpdated": "2024-11-15T17:15:43.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20091 (GCVE-0-2023-20091)

Vulnerability from nvd – Published: 2024-11-15 15:15 – Updated: 2024-11-15 17:48
VLAI?
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-61 - UNIX Symbolic Link (Symlink) Following
Assigner
Impacted products
Vendor Product Version
Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.10.2
Affected: CE9.1.4
Affected: CE9.9.3
Affected: CE9.10.3
Affected: CE9.1.5
Affected: CE9.2.4
Affected: CE9.10.1
Affected: CE9.13.0
Affected: CE9.1.2
Affected: CE9.1.1
Affected: CE9.9.4
Affected: CE9.2.1
Affected: CE9.1.3
Affected: CE9.0.1
Affected: CE9.1.6
Affected: CE9.12.4
Affected: CE9.2.2
Affected: CE9.12.3
Affected: CE9.2.3
Affected: CE9.13.1
Affected: CE9.14.3
Affected: CE9.14.4
Affected: CE9.13.2
Affected: CE9.12.5
Affected: CE9.14.5
Affected: CE9.15.0.10
Affected: CE9.15.0.11
Affected: CE9.13.3
Affected: CE9.15.0.13
Affected: CE9.14.6
Affected: CE9.15.3.17
Affected: CE9.14.7
Affected: CE9.15.0.19
Affected: CE9.15.3.19
Affected: CE9.15.3.18
Affected: CE9.15.3.22
Affected: CE9.15.8.12
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.13.0
Affected: CE9.15.15.4
Affected: CE9.15.16.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20091",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T17:47:56.924902Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:48:19.183Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.13"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.19"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.18"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.15.4"
            },
            {
              "status": "affected",
              "version": "CE9.15.16.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-61",
              "description": "UNIX Symbolic Link (Symlink) Following",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:15:03.615Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwc71178"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20091",
    "datePublished": "2024-11-15T15:15:03.615Z",
    "dateReserved": "2022-10-27T18:47:50.336Z",
    "dateUpdated": "2024-11-15T17:48:19.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20094 (GCVE-0-2023-20094)

Vulnerability from nvd – Published: 2024-11-15 15:08 – Updated: 2024-11-15 15:43
VLAI?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device. This vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information. Note: This vulnerability only affects Cisco Webex Desk Hub. There are no workarounds that address this vulnerability.
CWE
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20094",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:43:09.416209Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:43:30.207Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.\r\n\r\nThis vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.\r\nNote: This vulnerability only affects Cisco Webex Desk Hub.\r\nThere are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "Out-of-bounds Read",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T15:08:14.206Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-file-write-rHKwegKf",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-file-write-rHKwegKf",
        "defects": [
          "CSCwb86296"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20094",
    "datePublished": "2024-11-15T15:08:04.290Z",
    "dateReserved": "2022-10-27T18:47:50.336Z",
    "dateUpdated": "2024-11-15T15:43:30.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20008 (GCVE-0-2023-20008)

Vulnerability from nvd – Published: 2023-01-19 01:41 – Updated: 2024-08-02 08:57
VLAI?
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: RoomOS 10.3.2.0
Affected: RoomOS 10.3.4.0
Affected: RoomOS 10.8.2.5
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.15.3.0
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.0.1
Affected: CE9.1.1
Affected: CE9.1.2
Affected: CE9.1.3
Affected: CE9.1.4
Affected: CE9.1.5
Affected: CE9.1.6
Affected: CE9.10.1
Affected: CE9.10.2
Affected: CE9.10.3
Affected: CE9.12.4
Affected: CE9.12.5
Affected: CE9.12.3
Affected: CE9.13.0
Affected: CE9.13.1
Affected: CE9.13.3
Affected: CE9.13.2
Affected: CE9.2.1
Affected: CE9.2.2
Affected: CE9.2.3
Affected: CE9.2.4
Affected: CE9.9.3
Affected: CE9.9.4
Affected: CE9.14.3
Affected: CE9.14.5
Affected: CE9.14.4
Affected: CE9.14.6
Affected: CE9.14.7
Affected: CE9.15.0.11
Affected: CE9.15.0.10
Affected: CE9.15.8.12
Affected: CE9.15.13.0
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.3.17
Affected: CE9.15.3.22
Affected: CE9.15.0.19
Affected: TC7.3.21
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.15.3.0
Affected: 9.15.3.25
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.552Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-roomos-dkjGFgRK",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.2.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            }
          ]
        },
        {
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.8.12"
            },
            {
              "status": "affected",
              "version": "CE9.15.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "TC7.3.21"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            },
            {
              "status": "affected",
              "version": "9.15.3.25"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\r\n\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:57:30.027Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-dkjGFgRK",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-dkjGFgRK",
        "defects": [
          "CSCwc47201"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20008",
    "datePublished": "2023-01-19T01:41:03.629Z",
    "dateReserved": "2022-10-27T18:47:50.307Z",
    "dateUpdated": "2024-08-02T08:57:35.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20002 (GCVE-0-2023-20002)

Vulnerability from nvd – Published: 2023-01-19 01:40 – Updated: 2024-08-02 08:57
VLAI?
Summary
A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
Impacted products
Vendor Product Version
Cisco Cisco RoomOS Software Affected: RoomOS 10.3.2.0
Affected: RoomOS 10.3.4.0
Affected: RoomOS 10.8.2.5
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.15.3.0
Create a notification for this product.
    Cisco Cisco TelePresence Endpoint Software (TC/CE) Affected: CE9.0.1
Affected: CE9.1.1
Affected: CE9.1.2
Affected: CE9.1.3
Affected: CE9.1.4
Affected: CE9.1.5
Affected: CE9.1.6
Affected: CE9.10.1
Affected: CE9.10.2
Affected: CE9.10.3
Affected: CE9.12.4
Affected: CE9.12.5
Affected: CE9.12.3
Affected: CE9.13.0
Affected: CE9.13.1
Affected: CE9.13.3
Affected: CE9.13.2
Affected: CE9.2.1
Affected: CE9.2.2
Affected: CE9.2.3
Affected: CE9.2.4
Affected: CE9.9.3
Affected: CE9.9.4
Affected: CE9.14.3
Affected: CE9.14.5
Affected: CE9.14.4
Affected: CE9.14.6
Affected: CE9.14.7
Affected: CE9.15.0.11
Affected: CE9.15.0.10
Affected: CE9.15.10.8
Affected: CE9.15.3.26
Affected: CE9.15.3.25
Affected: CE9.15.3.17
Affected: CE9.15.3.22
Affected: CE9.15.0.19
Affected: RoomOS 10.8.4.0
Affected: RoomOS 10.11.3.0
Affected: RoomOS 10.11.5.2
Affected: RoomOS 10.15.3.0
Affected: 9.15.3.25
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.143Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-roomos-dkjGFgRK",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco RoomOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "RoomOS 10.3.2.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.3.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.2.5"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            }
          ]
        },
        {
          "product": "Cisco TelePresence Endpoint Software (TC/CE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "CE9.0.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.1"
            },
            {
              "status": "affected",
              "version": "CE9.1.2"
            },
            {
              "status": "affected",
              "version": "CE9.1.3"
            },
            {
              "status": "affected",
              "version": "CE9.1.4"
            },
            {
              "status": "affected",
              "version": "CE9.1.5"
            },
            {
              "status": "affected",
              "version": "CE9.1.6"
            },
            {
              "status": "affected",
              "version": "CE9.10.1"
            },
            {
              "status": "affected",
              "version": "CE9.10.2"
            },
            {
              "status": "affected",
              "version": "CE9.10.3"
            },
            {
              "status": "affected",
              "version": "CE9.12.4"
            },
            {
              "status": "affected",
              "version": "CE9.12.5"
            },
            {
              "status": "affected",
              "version": "CE9.12.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.0"
            },
            {
              "status": "affected",
              "version": "CE9.13.1"
            },
            {
              "status": "affected",
              "version": "CE9.13.3"
            },
            {
              "status": "affected",
              "version": "CE9.13.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.1"
            },
            {
              "status": "affected",
              "version": "CE9.2.2"
            },
            {
              "status": "affected",
              "version": "CE9.2.3"
            },
            {
              "status": "affected",
              "version": "CE9.2.4"
            },
            {
              "status": "affected",
              "version": "CE9.9.3"
            },
            {
              "status": "affected",
              "version": "CE9.9.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.3"
            },
            {
              "status": "affected",
              "version": "CE9.14.5"
            },
            {
              "status": "affected",
              "version": "CE9.14.4"
            },
            {
              "status": "affected",
              "version": "CE9.14.6"
            },
            {
              "status": "affected",
              "version": "CE9.14.7"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.11"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.10"
            },
            {
              "status": "affected",
              "version": "CE9.15.10.8"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.26"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.25"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.17"
            },
            {
              "status": "affected",
              "version": "CE9.15.3.22"
            },
            {
              "status": "affected",
              "version": "CE9.15.0.19"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.8.4.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.3.0"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.11.5.2"
            },
            {
              "status": "affected",
              "version": "RoomOS 10.15.3.0"
            },
            {
              "status": "affected",
              "version": "9.15.3.25"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to bypass access controls and conduct an SSRF attack through an affected device.\r\n\r This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected system."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:57:28.759Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-roomos-dkjGFgRK",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK"
        }
      ],
      "source": {
        "advisory": "cisco-sa-roomos-dkjGFgRK",
        "defects": [
          "CSCwc85914"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20002",
    "datePublished": "2023-01-19T01:40:44.838Z",
    "dateReserved": "2022-10-27T18:47:50.305Z",
    "dateUpdated": "2024-08-02T08:57:35.143Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}