Search criteria

42 vulnerabilities found for telepresence_system_3000 by cisco

FKIE_CVE-2014-0661

Vulnerability from fkie_nvd - Published: 2014-01-22 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Impacted products
Vendor Product Version
cisco telepresence_system_software *
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.8.4\(13\)
cisco telepresence_system_software 1.8.5\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2\(19\)
cisco telepresence_system_software 1.9.3\(44\)
cisco telepresence_system_software 1.9.4\(19\)
cisco telepresence_system_software 1.9.5\(7\)
cisco telepresence_system_software 1.9.6\(2\)
cisco telepresence_system_software 1.9.6.1\(3\)
cisco telepresence_system_software 1.10.0
cisco telepresence_system_software 1.10.0\(259\)
cisco telepresence_system_software 1.10.1
cisco telepresence_system_1000 -
cisco telepresence_system_1300-65 -
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_500-37 -
cisco telepresence_system_software *
cisco telepresence_system_software 6.0.0.1\(4\)
cisco telepresence_system_software 6.0.1\(50\)
cisco telepresence_system_software 6.0.2\(28\)
cisco telepresence_system_software 6.1.0\(90\)
cisco telepresence_system_1100 -
cisco telepresence_system_500-32 -
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F08637F-59D9-400D-B9C4-0EC13C8F8A7F",
              "versionEndIncluding": "1.10.1\\(43\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBAAC16-A2BE-4D8D-8DEA-9FD4BDA7E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8819E5D6-F369-4BD2-A816-94F7A919C4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "53734B19-352E-40F4-9A7C-E1A545B511FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3E2221-6FA5-4ABB-9102-414430E4865B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F861192D-6138-49D2-BF8A-2D10B863253A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A859689-4C45-4274-A46E-21CFC82EE4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F",
              "versionEndIncluding": "6.0.3\\(33\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "328C698B-0ABE-45C2-A2B1-91D9A42C8374",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24395007-C981-4CE9-92EB-29DBBF8F481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
    },
    {
      "lang": "es",
      "value": "El System Status Collection Daemon (SSCD) de Cisco TelePresence System 500-37, 1000, 1300-65, y 3xxx anterior a la versi\u00f3n 1.10.2(42), y 500-32, 1300-47, TX1310 65, y TX9xxx anterior a la versi\u00f3n 6.0.4(11), permite a atacantes remotos ejecutar comandos arbitrarios para provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) a trav\u00e9s de un mensaje XML-RPC manipulado, tambi\u00e9n conocido como Bug ID CSCui32796."
    }
  ],
  "id": "CVE-2014-0661",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-22T21:55:03.560",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://osvdb.org/102362"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://secunia.com/advisories/56533"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65071"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029656"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-3454

Vulnerability from fkie_nvd - Published: 2013-08-08 14:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
Impacted products
Vendor Product Version
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *
cisco telepresence_system_software *
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.0.1\(3\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2
cisco telepresence_system_software 1.9.2\(19\)
cisco telepresence_system_software 1.9.3
cisco telepresence_system_software 1.9.3\(44\)
cisco telepresence_system_software 1.9.4
cisco telepresence_system_software 1.9.4\(19\)
cisco telepresence_system_software 1.9.5
cisco telepresence_system_software 1.9.5\(7\)
cisco telepresence_system_software 1.9.6
cisco telepresence_system_software 1.9.6\(2\)
cisco telepresence_system_software 6.0.0.1\(4\)
cisco telepresence_system_software 6.0.1\(50\)
cisco telepresence_system_software 6.0.2\(28\)
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.1
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.0.1\(3\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2
cisco telepresence_system_software 1.9.3
cisco telepresence_system_software 1.9.4
cisco telepresence_system_software 1.9.5
cisco telepresence_system_software 1.9.6
cisco telepresence_system_software 1.10.0
cisco telepresence_system_1300 -
cisco telepresence_system_1300-65 -
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_500-32 -
cisco telepresence_system_500-37 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F",
              "versionEndIncluding": "6.0.3\\(33\\)",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35078524-0E13-4FDD-B6A1-8D8DDDD394B6",
              "versionEndIncluding": "1.10.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3094537-1152-4E51-A0C0-798A760A884A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence System Software v1.10.1 y anteriores en dispositivos 500, 13X0, 1X00, 30X0, y 3X00, y v6.0.3 y anteriores en dispositivos TX 9X00, tiene una contrase\u00f1a predeterminada de la cuenta pwrecovery, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos modificar la configuraci\u00f3n o realizar actos arbitrarios a trav\u00e9s de peticiones HTTPS, tambi\u00e9n conocido como Bug ID CSCui43128."
    }
  ],
  "id": "CVE-2013-3454",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-08-08T14:55:08.717",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-3073

Vulnerability from fkie_nvd - Published: 2012-07-12 10:34 - Updated: 2025-04-11 00:51
Severity ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
Impacted products
Vendor Product Version
cisco telepresence_multipoint_switch_software *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.0.4.0\(21\)
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.0\(254\)
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.1\(30\)
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.1.2\(6\)
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.0\(222\)
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.1\(2\)
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.2\(21\)
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.3.12
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.4\(4\)
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.5\(1\)
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.5.6\(1\)
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.0\(108\)
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.1\(2\)
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.2\(3\)
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.3\(2\)
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch_software 1.6.4\(3\)
cisco telepresence_multipoint_switch_software 1.7.0
cisco telepresence_multipoint_switch_software 1.7.0.1\(5\)
cisco telepresence_multipoint_switch_software 1.7.1\(15\)
cisco telepresence_multipoint_switch_software 1.7.2\(75\)
cisco telepresence_multipoint_switch_software 1.7.3\(2\)
cisco telepresence_multipoint_switch_software 1.8.0
cisco telepresence_multipoint_switch *
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_1300_65 *
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_t3 *
cisco telepresence_system_t3 *
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *
cisco telepresence_manager *
cisco telepresence_manager 1.1.0.0
cisco telepresence_manager 1.1.0.0\(209\)
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.2.0.0\(200\)
cisco telepresence_manager 1.3.2\(466\)
cisco telepresence_manager 1.4.0\(279\)
cisco telepresence_manager 1.5.1\(420\)
cisco telepresence_manager 1.5.2\(423\)
cisco telepresence_manager 1.6.0\(220\)
cisco telepresence_manager 1.6.2\(64\)
cisco telepresence_manager 1.6.3\(113\)
cisco telepresence_manager 1.6.5\(167\)
cisco telepresence_manager 1.7.1\(732\)
cisco telepresence_manager 1.7.2\(256\)
cisco telepresence_manager 1.7.3.1
cisco telepresence_manager 1.7.4
cisco telepresence_manager 1.7.5\(62\)
cisco telepresence_manager 1.8.0\(582\)
cisco telepresence_recording_server *
cisco telepresence_recording_server 1.6.1\(2\)
cisco telepresence_recording_server 1.6.2\(31\)
cisco telepresence_recording_server 1.6.3\(4\)
cisco telepresence_recording_server 1.7.0\(190\)
cisco telepresence_recording_server 1.7.1\(22\)
cisco telepresence_recording_server 1.7.2.1
cisco telepresence_recording_server 1.7.3\(3\)

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A362CA-FBED-46BF-8D1A-B4AA478C03E7",
              "versionEndIncluding": "1.8.0\\(1026\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9",
              "versionEndIncluding": "1.9.0.1\\(3\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*",
              "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1",
              "versionEndIncluding": "1.8.1\\(682\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF",
              "versionEndIncluding": "1.8.0\\(160\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n IP en Cisco TelePresence Multipoint Switch anterior a v1.8.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server v1.8 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante (1) un paquete IP mal formado, (2) una elevada cantidad de conexiones TCP, o (3) una elevada cantidad de conexiones de finalizaci\u00f3n TCP, cambien conocido como bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, y CSCty11338."
    }
  ],
  "id": "CVE-2012-3073",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-12T10:34:42.303",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-3075

Vulnerability from fkie_nvd - Published: 2012-07-12 10:34 - Updated: 2025-04-11 00:51
Severity ?
Summary
The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE616E-7EAA-46BA-ABAB-D5BF57ED05D9",
              "versionEndIncluding": "1.7.2\\(4937\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*",
              "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724."
    },
    {
      "lang": "es",
      "value": "La interfaz web de administraci\u00f3n en Cisco TelePresence Immersive Endpoint Devices anterior a v1.7.4 permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n TCP mal formada al puerto 443, tambi\u00e9n conocido como Bug ID CSCtn99724"
    }
  ],
  "id": "CVE-2012-3075",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-12T10:34:42.380",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-2486

Vulnerability from fkie_nvd - Published: 2012-07-12 10:34 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
Impacted products
Vendor Product Version
cisco telepresence_multipoint_switch_software *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.0.4.0\(21\)
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.0\(254\)
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.1\(30\)
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.1.2\(6\)
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.0\(222\)
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.1\(2\)
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.2\(21\)
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.3.12
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.4\(4\)
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.5\(1\)
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.5.6\(1\)
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.0\(108\)
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.1\(2\)
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.2\(3\)
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.3\(2\)
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch_software 1.6.4\(3\)
cisco telepresence_multipoint_switch_software 1.7.0
cisco telepresence_multipoint_switch_software 1.7.0.1\(5\)
cisco telepresence_multipoint_switch_software 1.7.1\(15\)
cisco telepresence_multipoint_switch_software 1.7.2\(75\)
cisco telepresence_multipoint_switch_software 1.7.3\(2\)
cisco telepresence_multipoint_switch_software 1.8.0
cisco telepresence_multipoint_switch_software 1.8.0\(1026\)
cisco telepresence_multipoint_switch_software 1.8.1\(1041\)
cisco telepresence_multipoint_switch_software 1.8.2
cisco telepresence_multipoint_switch_software 1.8.2\(2\)
cisco telepresence_multipoint_switch *
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 4.0.0
cisco telepresence_system_1300_65 *
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_t3 *
cisco telepresence_system_t3 *
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *
cisco telepresence_manager *
cisco telepresence_manager 1.1.0.0
cisco telepresence_manager 1.1.0.0\(209\)
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.2.0.0\(200\)
cisco telepresence_manager 1.3.2\(466\)
cisco telepresence_manager 1.4.0\(279\)
cisco telepresence_manager 1.5.1\(420\)
cisco telepresence_manager 1.5.2\(423\)
cisco telepresence_manager 1.6.0\(220\)
cisco telepresence_manager 1.6.2\(64\)
cisco telepresence_manager 1.6.3\(113\)
cisco telepresence_manager 1.6.5\(167\)
cisco telepresence_manager 1.7.1\(732\)
cisco telepresence_manager 1.7.2\(256\)
cisco telepresence_manager 1.7.3.1
cisco telepresence_manager 1.7.4
cisco telepresence_manager 1.7.5\(62\)
cisco telepresence_manager 1.8.0\(582\)
cisco telepresence_recording_server *
cisco telepresence_recording_server 1.6.1\(2\)
cisco telepresence_recording_server 1.6.2\(31\)
cisco telepresence_recording_server 1.6.3\(4\)
cisco telepresence_recording_server 1.7.0\(190\)
cisco telepresence_recording_server 1.7.1\(22\)
cisco telepresence_recording_server 1.7.2.1
cisco telepresence_recording_server 1.7.3\(3\)

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABAC2DE-6574-4D78-B775-B3A478C0DE84",
              "versionEndIncluding": "1.8.3\\(9\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0\\(1026\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "468F358D-D359-4D06-B6DF-A483BDFD69D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.1\\(1041\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8937CE7-8C1E-40F6-A8E7-2E145E2CCEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "11AAD5AE-CC9E-42C9-AE82-F9AAF8D1A76B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D150A878-0913-4307-ABAA-5456DC20D6C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9",
              "versionEndIncluding": "1.9.0.1\\(3\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF71FA2-B8FC-4AE7-A0FD-8A4FAA0FE510",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*",
              "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1",
              "versionEndIncluding": "1.8.1\\(682\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF",
              "versionEndIncluding": "1.8.0\\(160\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n del protocolo Cisco Discovery Protocol (CDP)  en Cisco TelePresence Multipoint Switch anterior a v1.9.0, Cisco TelePresence Immersive Endpoint Devices anterior a v1.9.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server anterior a v1.8.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de paquetes CDP mal formados, tambi\u00e9n conocido como Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, y  CSCtz40953."
    }
  ],
  "id": "CVE-2012-2486",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-12T10:34:42.257",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-3074

Vulnerability from fkie_nvd - Published: 2012-07-12 10:34 - Updated: 2025-04-11 00:51
Severity ?
Summary
An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382.
Impacted products
Vendor Product Version
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_1300_65 *
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_t3 *
cisco telepresence_system_t3 *
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9",
              "versionEndIncluding": "1.9.0.1\\(3\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*",
              "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382."
    },
    {
      "lang": "es",
      "value": "Una API no especificado en dispositivos Cisco TelePresence Immersive Endpoint anterior a  v1.9.1 permite a atacantes remotos ejecutar comandos arbitrarios mediante  el env\u00edo de una solicitud mal formada al puerto TCP 61460, tambi\u00e9n conocido como error ID CSCtz38382."
    }
  ],
  "id": "CVE-2012-3074",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-12T10:34:42.347",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0379

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtmlVendor Advisory
psirt@cisco.comhttp://www.securitytracker.com/id?1025111
psirt@cisco.comhttp://www.securitytracker.com/id?1025112
psirt@cisco.comhttp://www.securitytracker.com/id?1025113
psirt@cisco.comhttp://www.securitytracker.com/id?1025114
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025111
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025112
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025113
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025114
Impacted products
Vendor Product Version
cisco adaptive_security_appliance_software 1.6.0
cisco 5500_series_adaptive_security_appliance *
cisco asa_5500 *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.3.2
cisco telepresence_manager 1.4.0
cisco telepresence_manager 1.5.1
cisco telepresence_manager 1.5.2
cisco telepresence_manager 1.6.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB918FB-1194-43C0-BAAC-3876B59164B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "680CC0AB-9967-4E7D-9EA5-47B0FA1DB522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5220D887-FC9F-4286-AEFF-2ACD74EE6A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F5A0DF6-904A-415F-BA3C-10B290017F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19771971-2399-40AB-9823-A369E528FAF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A587E8-0C8C-4A76-BB33-AECF726FED79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con el software v1.6.x; Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x; Cisco TelePresence endpoint  con software v1.2.x hasta v1.6.x; y Cisco TelePresence Manager v1.2.x, v1.3.x, v1.4.x, v1.5.x, y v1.6.2 permite a atacantes remotos  ejecutar c\u00f3digo arbitrario mediante un paquete Cisco Discovery Protocol, tambi\u00e9n conocido como error IDs CSCtd75769, CSCtd75766, CSCtd75754, y CSCtd75761."
    }
  ],
  "id": "CVE-2011-0379",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.383",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025111"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025114"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0377

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco TelePresence endopint con software v1.2.x hasta v1.6.x permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del servicio) a trav\u00e9s de una  solicitud SOAP malformada en combinaci\u00f3n con un TelePresence Manager falsificado que proporciona una direcci\u00f3n IP no v\u00e1lida, tambi\u00e9n conocido como error ID CSCth03605."
    }
  ],
  "id": "CVE-2011-0377",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.243",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0378

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n TCP, relacionado con una \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb52587."
    }
  ],
  "id": "CVE-2011-0378",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.307",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0375

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCth24671."
    }
  ],
  "id": "CVE-2011-0375",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.087",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0376

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.1
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n TFTP en los dispositivos de Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x, v1.6.0 y v1.6.1 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n GET, tambi\u00e9n conocido como error ID CSCte43876."
    }
  ],
  "id": "CVE-2011-0376",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.167",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0373

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31685."
    }
  ],
  "id": "CVE-2011-0373",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:17.633",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0374

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31659."
    }
  ],
  "id": "CVE-2011-0374",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:17.727",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0372

Vulnerability from fkie_nvd - Published: 2011-02-25 12:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
Impacted products
Vendor Product Version
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_500_series *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados  ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidades de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31640."
    }
  ],
  "id": "CVE-2011-0372",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:01.557",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-0661 (GCVE-0-2014-0661)

Vulnerability from cvelistv5 – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:20
VLAI?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/102362 vdb-entryx_refsource_OSVDB
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/65071 vdb-entryx_refsource_BID
http://secunia.com/advisories/56533 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id/1029656 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:20:19.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102362"
          },
          {
            "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
          },
          {
            "name": "cisco-telepresence-cve20140661-command-exec(90624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
          },
          {
            "name": "65071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65071"
          },
          {
            "name": "56533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56533"
          },
          {
            "name": "1029656",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029656"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "102362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102362"
        },
        {
          "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
        },
        {
          "name": "cisco-telepresence-cve20140661-command-exec(90624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
        },
        {
          "name": "65071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65071"
        },
        {
          "name": "56533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56533"
        },
        {
          "name": "1029656",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029656"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-0661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102362"
            },
            {
              "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
            },
            {
              "name": "cisco-telepresence-cve20140661-command-exec(90624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
            },
            {
              "name": "65071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65071"
            },
            {
              "name": "56533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56533"
            },
            {
              "name": "1029656",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029656"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-0661",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-02T00:00:00",
    "dateUpdated": "2024-08-06T09:20:19.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3454 (GCVE-0-2013-3454)

Vulnerability from cvelistv5 – Published: 2013-08-08 14:00 – Updated: 2024-09-17 03:38
VLAI?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-08T14:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3454",
    "datePublished": "2013-08-08T14:00:00Z",
    "dateReserved": "2013-05-06T00:00:00Z",
    "dateUpdated": "2024-09-17T03:38:57.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2486 (GCVE-0-2012-2486)

Vulnerability from cvelistv5 – Published: 2012-07-12 10:00 – Updated: 2024-09-17 04:25
VLAI?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:34:25.760Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-2486",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-2486",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-07T00:00:00Z",
    "dateUpdated": "2024-09-17T04:25:44.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3074 (GCVE-0-2012-3074)

Vulnerability from cvelistv5 – Published: 2012-07-12 10:00 – Updated: 2024-09-16 19:34
VLAI?
Summary
An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3074",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T19:34:59.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3073 (GCVE-0-2012-3073)

Vulnerability from cvelistv5 – Published: 2012-07-12 10:00 – Updated: 2024-09-16 16:52
VLAI?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.512Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3073",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3073",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T16:52:38.118Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3075 (GCVE-0-2012-3075)

Vulnerability from cvelistv5 – Published: 2012-07-12 10:00 – Updated: 2024-09-16 21:07
VLAI?
Summary
The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.477Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3075",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T21:07:46.101Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0376 (GCVE-0-2011-0376)

Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1025112 vdb-entryx_refsource_SECTRACK
http://www.cisco.com/en/US/products/products_secu… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0376",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0376",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0377 (GCVE-0-2011-0377)

Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.047Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-endpoint-ipaddress-dos(65616)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
          },
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-endpoint-ipaddress-dos(65616)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
        },
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-endpoint-ipaddress-dos(65616)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
            },
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0377",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.047Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0661 (GCVE-0-2014-0661)

Vulnerability from nvd – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:20
VLAI?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/102362 vdb-entryx_refsource_OSVDB
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/65071 vdb-entryx_refsource_BID
http://secunia.com/advisories/56533 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id/1029656 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:20:19.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102362"
          },
          {
            "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
          },
          {
            "name": "cisco-telepresence-cve20140661-command-exec(90624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
          },
          {
            "name": "65071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65071"
          },
          {
            "name": "56533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56533"
          },
          {
            "name": "1029656",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029656"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "102362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102362"
        },
        {
          "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
        },
        {
          "name": "cisco-telepresence-cve20140661-command-exec(90624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
        },
        {
          "name": "65071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65071"
        },
        {
          "name": "56533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56533"
        },
        {
          "name": "1029656",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029656"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-0661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102362"
            },
            {
              "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
            },
            {
              "name": "cisco-telepresence-cve20140661-command-exec(90624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
            },
            {
              "name": "65071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65071"
            },
            {
              "name": "56533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56533"
            },
            {
              "name": "1029656",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029656"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-0661",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-02T00:00:00",
    "dateUpdated": "2024-08-06T09:20:19.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3454 (GCVE-0-2013-3454)

Vulnerability from nvd – Published: 2013-08-08 14:00 – Updated: 2024-09-17 03:38
VLAI?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-08T14:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3454",
    "datePublished": "2013-08-08T14:00:00Z",
    "dateReserved": "2013-05-06T00:00:00Z",
    "dateUpdated": "2024-09-17T03:38:57.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2486 (GCVE-0-2012-2486)

Vulnerability from nvd – Published: 2012-07-12 10:00 – Updated: 2024-09-17 04:25
VLAI?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:34:25.760Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-2486",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-2486",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-07T00:00:00Z",
    "dateUpdated": "2024-09-17T04:25:44.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3074 (GCVE-0-2012-3074)

Vulnerability from nvd – Published: 2012-07-12 10:00 – Updated: 2024-09-16 19:34
VLAI?
Summary
An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3074",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An unspecified API on Cisco TelePresence Immersive Endpoint Devices before 1.9.1 allows remote attackers to execute arbitrary commands by leveraging certain adjacency and sending a malformed request on TCP port 61460, aka Bug ID CSCtz38382."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3074",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T19:34:59.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3073 (GCVE-0-2012-3073)

Vulnerability from nvd – Published: 2012-07-12 10:00 – Updated: 2024-09-16 16:52
VLAI?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.512Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3073",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3073",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T16:52:38.118Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3075 (GCVE-0-2012-3075)

Vulnerability from nvd – Published: 2012-07-12 10:00 – Updated: 2024-09-16 21:07
VLAI?
Summary
The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.477Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3075",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T21:07:46.101Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0376 (GCVE-0-2011-0376)

Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1025112 vdb-entryx_refsource_SECTRACK
http://www.cisco.com/en/US/products/products_secu… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-31T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0376",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0376",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0377 (GCVE-0-2011-0377)

Vulnerability from nvd – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.047Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-endpoint-ipaddress-dos(65616)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
          },
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-endpoint-ipaddress-dos(65616)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
        },
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-endpoint-ipaddress-dos(65616)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616"
            },
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0377",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.047Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}