All the vulnerabilites related to cisco - telepresence_system_1300_65
cve-2012-3073
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-16 16:52
Severity ?
EPSS score ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-3073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-3073", "datePublished": "2012-07-12T10:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T16:52:38.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2486
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-17 04:25
Severity ?
EPSS score ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:25.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-2486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-2486", "datePublished": "2012-07-12T10:00:00Z", "dateReserved": "2012-05-07T00:00:00Z", "dateUpdated": "2024-09-17T04:25:44.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3075
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-16 21:07
Severity ?
EPSS score ?
Summary
The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-3075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-3075", "datePublished": "2012-07-12T10:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T21:07:46.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3074
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-16 19:34
Severity ?
EPSS score ?
Summary
An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-3074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-3074", "datePublished": "2012-07-12T10:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T19:34:59.361Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:39
Severity ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ABAC2DE-6574-4D78-B775-B3A478C0DE84", "versionEndIncluding": "1.8.3\\(9\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*", "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*", "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*", "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0\\(1026\\):*:*:*:*:*:*:*", "matchCriteriaId": "468F358D-D359-4D06-B6DF-A483BDFD69D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.1\\(1041\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8937CE7-8C1E-40F6-A8E7-2E145E2CCEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "11AAD5AE-CC9E-42C9-AE82-F9AAF8D1A76B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D150A878-0913-4307-ABAA-5456DC20D6C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9", "versionEndIncluding": "1.9.0.1\\(3\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*", "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF71FA2-B8FC-4AE7-A0FD-8A4FAA0FE510", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*", "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1", "versionEndIncluding": "1.8.1\\(682\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*", "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*", "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*", "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*", "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*", "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*", "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*", "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*", "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF", "versionEndIncluding": "1.8.0\\(160\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*", "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953." }, { "lang": "es", "value": "La implementaci\u00f3n del protocolo Cisco Discovery Protocol (CDP) en Cisco TelePresence Multipoint Switch anterior a v1.9.0, Cisco TelePresence Immersive Endpoint Devices anterior a v1.9.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server anterior a v1.8.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de paquetes CDP mal formados, tambi\u00e9n conocido como Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, y CSCtz40953." } ], "id": "CVE-2012-2486", "lastModified": "2024-11-21T01:39:08.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-12T10:34:42.257", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "04A362CA-FBED-46BF-8D1A-B4AA478C03E7", "versionEndIncluding": "1.8.0\\(1026\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*", "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*", "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*", "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9", "versionEndIncluding": "1.9.0.1\\(3\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*", "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*", "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1", "versionEndIncluding": "1.8.1\\(682\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*", "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*", "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*", "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*", "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*", "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*", "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*", "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*", "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF", "versionEndIncluding": "1.8.0\\(160\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*", "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338." }, { "lang": "es", "value": "La implementaci\u00f3n IP en Cisco TelePresence Multipoint Switch anterior a v1.8.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server v1.8 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante (1) un paquete IP mal formado, (2) una elevada cantidad de conexiones TCP, o (3) una elevada cantidad de conexiones de finalizaci\u00f3n TCP, cambien conocido como bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, y CSCty11338." } ], "id": "CVE-2012-3073", "lastModified": "2024-11-21T01:40:11.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-12T10:34:42.303", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9", "versionEndIncluding": "1.9.0.1\\(3\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*", "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*", "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382." }, { "lang": "es", "value": "Una API no especificado en dispositivos Cisco TelePresence Immersive Endpoint anterior a v1.9.1 permite a atacantes remotos ejecutar comandos arbitrarios mediante el env\u00edo de una solicitud mal formada al puerto TCP 61460, tambi\u00e9n conocido como error ID CSCtz38382." } ], "id": "CVE-2012-3074", "lastModified": "2024-11-21T01:40:11.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-12T10:34:42.347", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDE616E-7EAA-46BA-ABAB-D5BF57ED05D9", "versionEndIncluding": "1.7.2\\(4937\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*", "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724." }, { "lang": "es", "value": "La interfaz web de administraci\u00f3n en Cisco TelePresence Immersive Endpoint Devices anterior a v1.7.4 permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n TCP mal formada al puerto 443, tambi\u00e9n conocido como Bug ID CSCtn99724" } ], "id": "CVE-2012-3075", "lastModified": "2024-11-21T01:40:11.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-12T10:34:42.380", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }