All the vulnerabilites related to cisco - telepresence_system_1300-65
cve-2014-0661
Vulnerability from cvelistv5
Published
2014-01-22 21:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/102362 | vdb-entry, x_refsource_OSVDB | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90624 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/65071 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/56533 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1029656 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.722Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102362", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102362" }, { "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts" }, { "name": "cisco-telepresence-cve20140661-command-exec(90624)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624" }, { "name": "65071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65071" }, { "name": "56533", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56533" }, { "name": "1029656", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029656" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "102362", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102362" }, { "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts" }, { "name": "cisco-telepresence-cve20140661-command-exec(90624)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624" }, { "name": "65071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65071" }, { "name": "56533", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56533" }, { "name": "1029656", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029656" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-0661", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "102362", "refsource": "OSVDB", "url": "http://osvdb.org/102362" }, { "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts" }, { "name": "cisco-telepresence-cve20140661-command-exec(90624)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624" }, { "name": "65071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65071" }, { "name": "56533", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56533" }, { "name": "1029656", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029656" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-0661", "datePublished": "2014-01-22T21:00:00", "dateReserved": "2014-01-02T00:00:00", "dateUpdated": "2024-08-06T09:20:19.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3454
Vulnerability from cvelistv5
Published
2013-08-08 14:00
Modified
2024-09-17 03:38
Severity ?
EPSS score ?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-08T14:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3454", "datePublished": "2013-08-08T14:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T03:38:57.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-08-08 14:55
Modified
2024-11-21 01:53
Severity ?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F", "versionEndIncluding": "6.0.3\\(33\\)", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*", "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*", "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*", "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "35078524-0E13-4FDD-B6A1-8D8DDDD394B6", "versionEndIncluding": "1.10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*", "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3094537-1152-4E51-A0C0-798A760A884A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128." }, { "lang": "es", "value": "Cisco TelePresence System Software v1.10.1 y anteriores en dispositivos 500, 13X0, 1X00, 30X0, y 3X00, y v6.0.3 y anteriores en dispositivos TX 9X00, tiene una contrase\u00f1a predeterminada de la cuenta pwrecovery, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos modificar la configuraci\u00f3n o realizar actos arbitrarios a trav\u00e9s de peticiones HTTPS, tambi\u00e9n conocido como Bug ID CSCui43128." } ], "id": "CVE-2013-3454", "lastModified": "2024-11-21T01:53:39.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-08T14:55:08.717", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-22 21:55
Modified
2024-11-21 02:02
Severity ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F08637F-59D9-400D-B9C4-0EC13C8F8A7F", "versionEndIncluding": "1.10.1\\(43\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "8BBAAC16-A2BE-4D8D-8DEA-9FD4BDA7E17B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "8819E5D6-F369-4BD2-A816-94F7A919C4B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*", "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "53734B19-352E-40F4-9A7C-E1A545B511FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B3E2221-6FA5-4ABB-9102-414430E4865B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "F861192D-6138-49D2-BF8A-2D10B863253A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A859689-4C45-4274-A46E-21CFC82EE4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*", "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F", "versionEndIncluding": "6.0.3\\(33\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*", "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*", "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*", "matchCriteriaId": "328C698B-0ABE-45C2-A2B1-91D9A42C8374", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "24395007-C981-4CE9-92EB-29DBBF8F481E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796." }, { "lang": "es", "value": "El System Status Collection Daemon (SSCD) de Cisco TelePresence System 500-37, 1000, 1300-65, y 3xxx anterior a la versi\u00f3n 1.10.2(42), y 500-32, 1300-47, TX1310 65, y TX9xxx anterior a la versi\u00f3n 6.0.4(11), permite a atacantes remotos ejecutar comandos arbitrarios para provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) a trav\u00e9s de un mensaje XML-RPC manipulado, tambi\u00e9n conocido como Bug ID CSCui32796." } ], "id": "CVE-2014-0661", "lastModified": "2024-11-21T02:02:36.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-22T21:55:03.560", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/102362" }, { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/56533" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65071" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029656" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/102362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }