Search criteria
27 vulnerabilities found for telepresence_system_1000 by cisco
FKIE_CVE-2014-0661
Vulnerability from fkie_nvd - Published: 2014-01-22 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F08637F-59D9-400D-B9C4-0EC13C8F8A7F",
"versionEndIncluding": "1.10.1\\(43\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
"matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BBAAC16-A2BE-4D8D-8DEA-9FD4BDA7E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8819E5D6-F369-4BD2-A816-94F7A919C4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
"matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "53734B19-352E-40F4-9A7C-E1A545B511FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0B3E2221-6FA5-4ABB-9102-414430E4865B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F861192D-6138-49D2-BF8A-2D10B863253A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A859689-4C45-4274-A46E-21CFC82EE4E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F",
"versionEndIncluding": "6.0.3\\(33\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
"matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*",
"matchCriteriaId": "328C698B-0ABE-45C2-A2B1-91D9A42C8374",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24395007-C981-4CE9-92EB-29DBBF8F481E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
},
{
"lang": "es",
"value": "El System Status Collection Daemon (SSCD) de Cisco TelePresence System 500-37, 1000, 1300-65, y 3xxx anterior a la versi\u00f3n 1.10.2(42), y 500-32, 1300-47, TX1310 65, y TX9xxx anterior a la versi\u00f3n 6.0.4(11), permite a atacantes remotos ejecutar comandos arbitrarios para provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) a trav\u00e9s de un mensaje XML-RPC manipulado, tambi\u00e9n conocido como Bug ID CSCui32796."
}
],
"id": "CVE-2014-0661",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-01-22T21:55:03.560",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/102362"
},
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/56533"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65071"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029656"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/102362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/56533"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65071"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0378
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
},
{
"lang": "es",
"value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n TCP, relacionado con una \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb52587."
}
],
"id": "CVE-2011-0378",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:18.307",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0375
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
},
{
"lang": "es",
"value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCth24671."
}
],
"id": "CVE-2011-0375",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:18.087",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0377
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
},
{
"lang": "es",
"value": "Dispositivos Cisco TelePresence endopint con software v1.2.x hasta v1.6.x permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del servicio) a trav\u00e9s de una solicitud SOAP malformada en combinaci\u00f3n con un TelePresence Manager falsificado que proporciona una direcci\u00f3n IP no v\u00e1lida, tambi\u00e9n conocido como error ID CSCth03605."
}
],
"id": "CVE-2011-0377",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:18.243",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0379
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB918FB-1194-43C0-BAAC-3876B59164B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "680CC0AB-9967-4E7D-9EA5-47B0FA1DB522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5220D887-FC9F-4286-AEFF-2ACD74EE6A30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5A0DF6-904A-415F-BA3C-10B290017F6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "19771971-2399-40AB-9823-A369E528FAF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "16A587E8-0C8C-4A76-BB33-AECF726FED79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con el software v1.6.x; Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x; Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x; y Cisco TelePresence Manager v1.2.x, v1.3.x, v1.4.x, v1.5.x, y v1.6.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un paquete Cisco Discovery Protocol, tambi\u00e9n conocido como error IDs CSCtd75769, CSCtd75766, CSCtd75754, y CSCtd75761."
}
],
"id": "CVE-2011-0379",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:18.383",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025111"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025113"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025114"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025114"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0376
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
},
{
"lang": "es",
"value": "La implementaci\u00f3n TFTP en los dispositivos de Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x, v1.6.0 y v1.6.1 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n GET, tambi\u00e9n conocido como error ID CSCte43876."
}
],
"id": "CVE-2011-0376",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:18.167",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0373
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
},
{
"lang": "es",
"value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31685."
}
],
"id": "CVE-2011-0373",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:17.633",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0374
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
},
{
"lang": "es",
"value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31659."
}
],
"id": "CVE-2011-0374",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:17.727",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0372
Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
},
{
"lang": "es",
"value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidades de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31640."
}
],
"id": "CVE-2011-0372",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-25T12:00:01.557",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025112"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-0661 (GCVE-0-2014-0661)
Vulnerability from cvelistv5 – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:20
VLAI?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:20:19.722Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "102362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102362"
},
{
"name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"name": "cisco-telepresence-cve20140661-command-exec(90624)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"name": "65071",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65071"
},
{
"name": "56533",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/56533"
},
{
"name": "1029656",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029656"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "102362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102362"
},
{
"name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"name": "cisco-telepresence-cve20140661-command-exec(90624)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"name": "65071",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65071"
},
{
"name": "56533",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/56533"
},
{
"name": "1029656",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029656"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0661",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "102362",
"refsource": "OSVDB",
"url": "http://osvdb.org/102362"
},
{
"name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"name": "cisco-telepresence-cve20140661-command-exec(90624)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"name": "65071",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65071"
},
{
"name": "56533",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56533"
},
{
"name": "1029656",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029656"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-0661",
"datePublished": "2014-01-22T21:00:00",
"dateReserved": "2014-01-02T00:00:00",
"dateUpdated": "2024-08-06T09:20:19.722Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0373 (GCVE-0-2011-0373)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.032Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0373",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0373",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0376 (GCVE-0-2011-0376)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.622Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0376",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0376",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.622Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0372 (GCVE-0-2011-0372)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.023Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0372",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0372",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.023Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0374 (GCVE-0-2011-0374)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.922Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0374",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0374",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.922Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0377 (GCVE-0-2011-0377)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.047Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-endpoint-ipaddress-dos(65616)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-endpoint-ipaddress-dos(65616)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0377",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-endpoint-ipaddress-dos(65616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0377",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.047Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0378 (GCVE-0-2011-0378)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.961Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0378",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0375 (GCVE-0-2011-0375)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.494Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0375",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0375",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.494Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0379 (GCVE-0-2011-0379)
Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.057Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025111",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025111"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"name": "1025114",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025114"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"name": "1025113",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025113"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-18T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025111",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025111"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"name": "1025114",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025114"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"name": "1025113",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025113"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025111",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025111"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"name": "1025114",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025114"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"name": "1025113",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025113"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0379",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.057Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0661 (GCVE-0-2014-0661)
Vulnerability from nvd – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:20
VLAI?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:20:19.722Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "102362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102362"
},
{
"name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"name": "cisco-telepresence-cve20140661-command-exec(90624)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"name": "65071",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65071"
},
{
"name": "56533",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/56533"
},
{
"name": "1029656",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029656"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "102362",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102362"
},
{
"name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"name": "cisco-telepresence-cve20140661-command-exec(90624)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"name": "65071",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65071"
},
{
"name": "56533",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/56533"
},
{
"name": "1029656",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029656"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-0661",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "102362",
"refsource": "OSVDB",
"url": "http://osvdb.org/102362"
},
{
"name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
},
{
"name": "cisco-telepresence-cve20140661-command-exec(90624)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"name": "65071",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65071"
},
{
"name": "56533",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56533"
},
{
"name": "1029656",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029656"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-0661",
"datePublished": "2014-01-22T21:00:00",
"dateReserved": "2014-01-02T00:00:00",
"dateUpdated": "2024-08-06T09:20:19.722Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0373 (GCVE-0-2011-0373)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.032Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0373",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0373",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0376 (GCVE-0-2011-0376)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.622Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0376",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0376",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.622Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0372 (GCVE-0-2011-0372)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.023Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0372",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0372",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.023Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0374 (GCVE-0-2011-0374)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.922Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0374",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0374",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.922Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0377 (GCVE-0-2011-0377)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.047Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-endpoint-ipaddress-dos(65616)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-endpoint-ipaddress-dos(65616)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0377",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-endpoint-ipaddress-dos(65616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
},
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0377",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.047Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0378 (GCVE-0-2011-0378)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.961Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0378",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0375 (GCVE-0-2011-0375)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.494Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-31T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0375",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0375",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.494Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0379 (GCVE-0-2011-0379)
Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:09.057Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025111",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025111"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"name": "1025114",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025114"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"name": "1025113",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025113"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-18T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025111",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025111"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"name": "1025114",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025114"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"name": "1025112",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"name": "1025113",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025113"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025111",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025111"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
},
{
"name": "1025114",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025114"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
},
{
"name": "1025112",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025112"
},
{
"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
},
{
"name": "1025113",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025113"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-0379",
"datePublished": "2011-02-25T11:00:00",
"dateReserved": "2011-01-07T00:00:00",
"dateUpdated": "2024-08-06T21:51:09.057Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}