All the vulnerabilites related to cisco - telepresence_system_1000
cve-2011-0379
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025111",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025111"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
          },
          {
            "name": "1025114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025114"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-18T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025111",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025111"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
        },
        {
          "name": "1025114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025114"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0379",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025111",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025111"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
            },
            {
              "name": "1025114",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025114"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0379",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.057Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0372
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.023Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0372",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0372",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.023Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0377
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.047Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-endpoint-ipaddress-dos(65616)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
          },
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-endpoint-ipaddress-dos(65616)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
        },
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-endpoint-ipaddress-dos(65616)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
            },
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0377",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.047Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0375
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.494Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0375",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0375",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.494Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-0661
Vulnerability from cvelistv5
Published
2014-01-22 21:00
Modified
2024-08-06 09:20
Severity ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
References
http://osvdb.org/102362vdb-entry, x_refsource_OSVDB
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-ctsvendor-advisory, x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/90624vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/65071vdb-entry, x_refsource_BID
http://secunia.com/advisories/56533third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id/1029656vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:20:19.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102362"
          },
          {
            "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
          },
          {
            "name": "cisco-telepresence-cve20140661-command-exec(90624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
          },
          {
            "name": "65071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65071"
          },
          {
            "name": "56533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56533"
          },
          {
            "name": "1029656",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029656"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "102362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102362"
        },
        {
          "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
        },
        {
          "name": "cisco-telepresence-cve20140661-command-exec(90624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
        },
        {
          "name": "65071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65071"
        },
        {
          "name": "56533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56533"
        },
        {
          "name": "1029656",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029656"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-0661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102362"
            },
            {
              "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
            },
            {
              "name": "cisco-telepresence-cve20140661-command-exec(90624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
            },
            {
              "name": "65071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65071"
            },
            {
              "name": "56533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56533"
            },
            {
              "name": "1029656",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029656"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-0661",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-02T00:00:00",
    "dateUpdated": "2024-08-06T09:20:19.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0374
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0374",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0374",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.922Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0376
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0376",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0376",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0378
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.961Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0378",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0378",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0373
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.032Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0373",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0373",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.032Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2014-01-22 21:55
Modified
2024-11-21 02:02
Severity ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Impacted products
Vendor Product Version
cisco telepresence_system_software *
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.8.4\(13\)
cisco telepresence_system_software 1.8.5\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2\(19\)
cisco telepresence_system_software 1.9.3\(44\)
cisco telepresence_system_software 1.9.4\(19\)
cisco telepresence_system_software 1.9.5\(7\)
cisco telepresence_system_software 1.9.6\(2\)
cisco telepresence_system_software 1.9.6.1\(3\)
cisco telepresence_system_software 1.10.0
cisco telepresence_system_software 1.10.0\(259\)
cisco telepresence_system_software 1.10.1
cisco telepresence_system_1000 -
cisco telepresence_system_1300-65 -
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_500-37 -
cisco telepresence_system_software *
cisco telepresence_system_software 6.0.0.1\(4\)
cisco telepresence_system_software 6.0.1\(50\)
cisco telepresence_system_software 6.0.2\(28\)
cisco telepresence_system_software 6.1.0\(90\)
cisco telepresence_system_1100 -
cisco telepresence_system_500-32 -
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F08637F-59D9-400D-B9C4-0EC13C8F8A7F",
              "versionEndIncluding": "1.10.1\\(43\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBAAC16-A2BE-4D8D-8DEA-9FD4BDA7E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8819E5D6-F369-4BD2-A816-94F7A919C4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "53734B19-352E-40F4-9A7C-E1A545B511FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3E2221-6FA5-4ABB-9102-414430E4865B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F861192D-6138-49D2-BF8A-2D10B863253A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A859689-4C45-4274-A46E-21CFC82EE4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F",
              "versionEndIncluding": "6.0.3\\(33\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "328C698B-0ABE-45C2-A2B1-91D9A42C8374",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24395007-C981-4CE9-92EB-29DBBF8F481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
    },
    {
      "lang": "es",
      "value": "El System Status Collection Daemon (SSCD) de Cisco TelePresence System 500-37, 1000, 1300-65, y 3xxx anterior a la versi\u00f3n 1.10.2(42), y 500-32, 1300-47, TX1310 65, y TX9xxx anterior a la versi\u00f3n 6.0.4(11), permite a atacantes remotos ejecutar comandos arbitrarios para provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) a trav\u00e9s de un mensaje XML-RPC manipulado, tambi\u00e9n conocido como Bug ID CSCui32796."
    }
  ],
  "id": "CVE-2014-0661",
  "lastModified": "2024-11-21T02:02:36.660",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-22T21:55:03.560",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/102362"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://secunia.com/advisories/56533"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65071"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029656"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025111
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025112
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025113
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025114
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025111
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025112
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025113
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025114
Impacted products
Vendor Product Version
cisco adaptive_security_appliance_software 1.6.0
cisco 5500_series_adaptive_security_appliance *
cisco asa_5500 *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.3.2
cisco telepresence_manager 1.4.0
cisco telepresence_manager 1.5.1
cisco telepresence_manager 1.5.2
cisco telepresence_manager 1.6.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB918FB-1194-43C0-BAAC-3876B59164B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "680CC0AB-9967-4E7D-9EA5-47B0FA1DB522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5220D887-FC9F-4286-AEFF-2ACD74EE6A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F5A0DF6-904A-415F-BA3C-10B290017F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19771971-2399-40AB-9823-A369E528FAF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A587E8-0C8C-4A76-BB33-AECF726FED79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con el software v1.6.x; Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x; Cisco TelePresence endpoint  con software v1.2.x hasta v1.6.x; y Cisco TelePresence Manager v1.2.x, v1.3.x, v1.4.x, v1.5.x, y v1.6.2 permite a atacantes remotos  ejecutar c\u00f3digo arbitrario mediante un paquete Cisco Discovery Protocol, tambi\u00e9n conocido como error IDs CSCtd75769, CSCtd75766, CSCtd75754, y CSCtd75761."
    }
  ],
  "id": "CVE-2011-0379",
  "lastModified": "2024-11-21T01:23:50.823",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.383",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025111"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025114"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n TFTP en los dispositivos de Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x, v1.6.0 y v1.6.1 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n GET, tambi\u00e9n conocido como error ID CSCte43876."
    }
  ],
  "id": "CVE-2011-0376",
  "lastModified": "2024-11-21T01:23:50.300",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.167",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCth24671."
    }
  ],
  "id": "CVE-2011-0375",
  "lastModified": "2024-11-21T01:23:50.127",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.087",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidades de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31640."
    }
  ],
  "id": "CVE-2011-0372",
  "lastModified": "2024-11-21T01:23:49.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:01.557",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco TelePresence endopint con software v1.2.x hasta v1.6.x permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del servicio) a trav\u00e9s de una  solicitud SOAP malformada en combinaci\u00f3n con un TelePresence Manager falsificado que proporciona una direcci\u00f3n IP no v\u00e1lida, tambi\u00e9n conocido como error ID CSCth03605."
    }
  ],
  "id": "CVE-2011-0377",
  "lastModified": "2024-11-21T01:23:50.457",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.243",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31685."
    }
  ],
  "id": "CVE-2011-0373",
  "lastModified": "2024-11-21T01:23:49.803",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:17.633",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n TCP, relacionado con una \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb52587."
    }
  ],
  "id": "CVE-2011-0378",
  "lastModified": "2024-11-21T01:23:50.693",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.307",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31659."
    }
  ],
  "id": "CVE-2011-0374",
  "lastModified": "2024-11-21T01:23:49.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:17.727",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}