Search criteria

75 vulnerabilities found for telepresence_system_software by cisco

FKIE_CVE-2014-3362

Vulnerability from fkie_nvd - Published: 2014-09-12 01:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "424CB6E0-DF4E-4F30-B1DC-83E2E3E0FAB0",
              "versionEndIncluding": "f9.3.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77E89D9-93BB-4B6A-A17B-5BB4C637981B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "508D9F0A-FAEC-4F59-ACE6-E851D6313DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677."
    },
    {
      "lang": "es",
      "value": "Fuga de memoria en Cisco TelePresence System Edge MXP Series Software F9.3.3 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio (interrupci\u00f3n de la gesti\u00f3n) a trav\u00e9s de m\u00faltiples conexiones TELNET, tambi\u00e9n conocido como Bug ID CSCuo63677."
    }
  ],
  "id": "CVE-2014-3362",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-09-12T01:55:07.013",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://secunia.com/advisories/61072"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-3274

Vulnerability from fkie_nvd - Published: 2014-05-26 00:25 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326.
Impacted products
Vendor Product Version
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.8.4\(13\)
cisco telepresence_system_software 1.8.5\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.0.1\(3\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2
cisco telepresence_system_software 1.9.2\(19\)
cisco telepresence_system_software 1.9.3
cisco telepresence_system_software 1.9.3\(44\)
cisco telepresence_system_software 1.9.4
cisco telepresence_system_software 1.9.4\(19\)
cisco telepresence_system_software 1.9.5
cisco telepresence_system_software 1.9.5\(7\)
cisco telepresence_system_software 1.9.6
cisco telepresence_system_software 1.9.6\(2\)
cisco telepresence_system_software 1.9.6.1\(3\)
cisco telepresence_system_software 1.10.0
cisco telepresence_system_software 1.10.0\(259\)
cisco telepresence_system_software 1.10.1
cisco telepresence_system_software 1.10.1\(43\)
cisco telepresence_system_software 1.10.2\(42\)
cisco telepresence_system_software 1.10.3\(41\)
cisco telepresence_system_software 4.0.0
cisco telepresence_system_software 6.0.0.1\(4\)
cisco telepresence_system_software 6.0.1\(50\)
cisco telepresence_system_software 6.0.2\(28\)
cisco telepresence_system_software 6.0.3\(33\)
cisco telepresence_system_software 6.0.4\(11\)

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89820E2D-120B-4E92-95FE-7D4072C915F6",
              "versionEndIncluding": "6.0.5\\(5\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBAAC16-A2BE-4D8D-8DEA-9FD4BDA7E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8819E5D6-F369-4BD2-A816-94F7A919C4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "53734B19-352E-40F4-9A7C-E1A545B511FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3E2221-6FA5-4ABB-9102-414430E4865B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F861192D-6138-49D2-BF8A-2D10B863253A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1\\(43\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5E6F9075-05E8-4B02-94C3-6AC2D36F5979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.2\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "93666603-82A3-4E19-9BD1-4B0F39390992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.3\\(41\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED6E73D-7510-44DB-ADDB-9F757F90232E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF71FA2-B8FC-4AE7-A0FD-8A4FAA0FE510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.3\\(33\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E32AA0A3-88AD-40D9-BF87-0DB0C1C7DADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.4\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45697A1C-B866-4BFE-8311-C82DDCE0A5C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence System (CTS) 6.0(.5)(5) y anteriores recurre a HTTP cuando ciertas sesiones HTTPS no pueden ser establecidas, lo que permite a atacantes man-in-the-middle obtener informaci\u00f3n sensible de directorio mediante el aprovechamiento de una posici\u00f3n de red entre CTS y Cisco Unified Communications Manager (UCM) para bloquear trafico HTTPS, tambi\u00e9n conocido como Bug ID CSCuj26326."
    }
  ],
  "id": "CVE-2014-3274",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-26T00:25:31.407",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1030272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1030272"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2160

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A29C747-0993-48EB-BDA4-0340D84DCFB2",
              "versionEndIncluding": "f9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7588AA7A-8D34-499D-A6F1-7A20A99E1A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B089B3DA-D7D5-4854-9752-0D2D71451BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9434C-AF5D-409D-9916-AA33E7150AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C593FA3F-2E60-4DA6-B344-ABFC0A9306B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1801A743-50BD-4EA6-870D-F7823D4360AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C7580D-A36B-42EB-B2B7-D8867085B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C6AA92-44CC-4B5E-A2AD-BC1344052D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36F9689-016D-432D-9689-03CC9BFAAD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45BED17-ED6A-4033-9E8A-9DB6017ED3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745."
    },
    {
      "lang": "es",
      "value": "El subsistema H.225 en Cisco TelePresence System Serie MXP Software anterior a F9.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes manipulados, tambi\u00e9n conocido como Bug ID CSCty45745."
    }
  ],
  "id": "CVE-2014-2160",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.100",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2158

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A29C747-0993-48EB-BDA4-0340D84DCFB2",
              "versionEndIncluding": "f9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7588AA7A-8D34-499D-A6F1-7A20A99E1A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B089B3DA-D7D5-4854-9752-0D2D71451BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9434C-AF5D-409D-9916-AA33E7150AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C593FA3F-2E60-4DA6-B344-ABFC0A9306B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1801A743-50BD-4EA6-870D-F7823D4360AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C7580D-A36B-42EB-B2B7-D8867085B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C6AA92-44CC-4B5E-A2AD-BC1344052D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36F9689-016D-432D-9689-03CC9BFAAD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45BED17-ED6A-4033-9E8A-9DB6017ED3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence System Serie MXP Software anterior a F9.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCty45720."
    }
  ],
  "id": "CVE-2014-2158",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.037",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2159

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A29C747-0993-48EB-BDA4-0340D84DCFB2",
              "versionEndIncluding": "f9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7588AA7A-8D34-499D-A6F1-7A20A99E1A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B089B3DA-D7D5-4854-9752-0D2D71451BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9434C-AF5D-409D-9916-AA33E7150AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C593FA3F-2E60-4DA6-B344-ABFC0A9306B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1801A743-50BD-4EA6-870D-F7823D4360AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C7580D-A36B-42EB-B2B7-D8867085B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C6AA92-44CC-4B5E-A2AD-BC1344052D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36F9689-016D-432D-9689-03CC9BFAAD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45BED17-ED6A-4033-9E8A-9DB6017ED3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722."
    },
    {
      "lang": "es",
      "value": "El subsistema H.225 en Cisco TelePresence System Serie MXP Software anterior a F9.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes manipulados, tambi\u00e9n conocido como Bug ID CSCtq78722."
    }
  ],
  "id": "CVE-2014-2159",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.070",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2157

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A29C747-0993-48EB-BDA4-0340D84DCFB2",
              "versionEndIncluding": "f9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7588AA7A-8D34-499D-A6F1-7A20A99E1A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B089B3DA-D7D5-4854-9752-0D2D71451BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9434C-AF5D-409D-9916-AA33E7150AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C593FA3F-2E60-4DA6-B344-ABFC0A9306B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1801A743-50BD-4EA6-870D-F7823D4360AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C7580D-A36B-42EB-B2B7-D8867085B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C6AA92-44CC-4B5E-A2AD-BC1344052D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36F9689-016D-432D-9689-03CC9BFAAD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45BED17-ED6A-4033-9E8A-9DB6017ED3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence System Serie MXP Software anterior a F9.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCty45733."
    }
  ],
  "evaluatorImpact": "Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp\n\n\" Vulnerable Products\nThe following products running a version of Cisco TelePresence System MXP Series Software prior to F9.3.1 are affected by the vulnerabilities described in this advisory:\n\n    Cisco TelePresence System 1700 MXP\n    Cisco TelePresence System 1000 MXP\n    Cisco TelePresence System Edge 75 MXP\n    Cisco TelePresence System Edge 85 MXP\n    Cisco TelePresence System Edge 95 MXP\n    Cisco TelePresence System Codec 3000 MXP\n    Cisco TelePresence System Codec 6000 MXP\n    Tandberg 550 MXP\n    Tandberg 770 MXP\n    Tandberg 880 MXP\n    Tandberg 990 MXP\n    Tandberg 2000 MXP\"",
  "id": "CVE-2014-2157",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.007",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2161

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A29C747-0993-48EB-BDA4-0340D84DCFB2",
              "versionEndIncluding": "f9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7588AA7A-8D34-499D-A6F1-7A20A99E1A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B089B3DA-D7D5-4854-9752-0D2D71451BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9434C-AF5D-409D-9916-AA33E7150AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C593FA3F-2E60-4DA6-B344-ABFC0A9306B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1801A743-50BD-4EA6-870D-F7823D4360AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C7580D-A36B-42EB-B2B7-D8867085B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C6AA92-44CC-4B5E-A2AD-BC1344052D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36F9689-016D-432D-9689-03CC9BFAAD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45BED17-ED6A-4033-9E8A-9DB6017ED3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731."
    },
    {
      "lang": "es",
      "value": "El subsistema H.225 en Cisco TelePresence System Serie MXP Software anterior a F9.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes manipulados, tambi\u00e9n conocido como Bug ID CSCty45731."
    }
  ],
  "id": "CVE-2014-2161",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.117",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2156

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A29C747-0993-48EB-BDA4-0340D84DCFB2",
              "versionEndIncluding": "f9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5AE2ED-DFA1-4006-9AF2-0DAFE04CA137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EF5B04-FF47-4421-9079-3A12ECED6CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB1740ED-2FD7-4DD3-A338-ED92B4646FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AE79EB-E782-40E3-BB0C-95BD3EDB999E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CEEFB3-43FA-496E-BD4C-9A038DF7A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBE62D4-23AE-458F-B432-520BD67E1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "93945E40-6D00-4D82-BBA2-2D36D3917CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F889108D-F2A6-4B72-957D-D6523E4462FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADE6544-172E-42A2-8EEE-0BEB226AEAE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7588AA7A-8D34-499D-A6F1-7A20A99E1A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B089B3DA-D7D5-4854-9752-0D2D71451BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D9434C-AF5D-409D-9916-AA33E7150AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C593FA3F-2E60-4DA6-B344-ABFC0A9306B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1801A743-50BD-4EA6-870D-F7823D4360AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C7580D-A36B-42EB-B2B7-D8867085B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C6AA92-44CC-4B5E-A2AD-BC1344052D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36F9689-016D-432D-9689-03CC9BFAAD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45BED17-ED6A-4033-9E8A-9DB6017ED3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EF08E9-43DC-48ED-AA51-9AB2F36C49CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C4B3F1-F6E8-4E69-93EC-14A5ED18DD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F417CBA6-C471-436E-B9C0-C601AAC895DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence System Serie MXP Software anterior a F9.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCty45739."
    }
  ],
  "evaluatorImpact": "Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp\n\n\" Vulnerable Products\nThe following products running a version of Cisco TelePresence System MXP Series Software prior to F9.3.1 are affected by the vulnerabilities described in this advisory:\n\n    Cisco TelePresence System 1700 MXP\n    Cisco TelePresence System 1000 MXP\n    Cisco TelePresence System Edge 75 MXP\n    Cisco TelePresence System Edge 85 MXP\n    Cisco TelePresence System Edge 95 MXP\n    Cisco TelePresence System Codec 3000 MXP\n    Cisco TelePresence System Codec 6000 MXP\n    Tandberg 550 MXP\n    Tandberg 770 MXP\n    Tandberg 880 MXP\n    Tandberg 990 MXP\n    Tandberg 2000 MXP\"\n",
  "id": "CVE-2014-2156",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:07.977",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-0661

Vulnerability from fkie_nvd - Published: 2014-01-22 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Impacted products
Vendor Product Version
cisco telepresence_system_software *
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.8.4\(13\)
cisco telepresence_system_software 1.8.5\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2\(19\)
cisco telepresence_system_software 1.9.3\(44\)
cisco telepresence_system_software 1.9.4\(19\)
cisco telepresence_system_software 1.9.5\(7\)
cisco telepresence_system_software 1.9.6\(2\)
cisco telepresence_system_software 1.9.6.1\(3\)
cisco telepresence_system_software 1.10.0
cisco telepresence_system_software 1.10.0\(259\)
cisco telepresence_system_software 1.10.1
cisco telepresence_system_1000 -
cisco telepresence_system_1300-65 -
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_500-37 -
cisco telepresence_system_software *
cisco telepresence_system_software 6.0.0.1\(4\)
cisco telepresence_system_software 6.0.1\(50\)
cisco telepresence_system_software 6.0.2\(28\)
cisco telepresence_system_software 6.1.0\(90\)
cisco telepresence_system_1100 -
cisco telepresence_system_500-32 -
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F08637F-59D9-400D-B9C4-0EC13C8F8A7F",
              "versionEndIncluding": "1.10.1\\(43\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBAAC16-A2BE-4D8D-8DEA-9FD4BDA7E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8819E5D6-F369-4BD2-A816-94F7A919C4B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "53734B19-352E-40F4-9A7C-E1A545B511FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0B3E2221-6FA5-4ABB-9102-414430E4865B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F861192D-6138-49D2-BF8A-2D10B863253A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A859689-4C45-4274-A46E-21CFC82EE4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F",
              "versionEndIncluding": "6.0.3\\(33\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "328C698B-0ABE-45C2-A2B1-91D9A42C8374",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24395007-C981-4CE9-92EB-29DBBF8F481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
    },
    {
      "lang": "es",
      "value": "El System Status Collection Daemon (SSCD) de Cisco TelePresence System 500-37, 1000, 1300-65, y 3xxx anterior a la versi\u00f3n 1.10.2(42), y 500-32, 1300-47, TX1310 65, y TX9xxx anterior a la versi\u00f3n 6.0.4(11), permite a atacantes remotos ejecutar comandos arbitrarios para provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) a trav\u00e9s de un mensaje XML-RPC manipulado, tambi\u00e9n conocido como Bug ID CSCui32796."
    }
  ],
  "id": "CVE-2014-0661",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-22T21:55:03.560",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://osvdb.org/102362"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://secunia.com/advisories/56533"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65071"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029656"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-3454

Vulnerability from fkie_nvd - Published: 2013-08-08 14:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
Impacted products
Vendor Product Version
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *
cisco telepresence_system_software *
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.0.1\(3\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2
cisco telepresence_system_software 1.9.2\(19\)
cisco telepresence_system_software 1.9.3
cisco telepresence_system_software 1.9.3\(44\)
cisco telepresence_system_software 1.9.4
cisco telepresence_system_software 1.9.4\(19\)
cisco telepresence_system_software 1.9.5
cisco telepresence_system_software 1.9.5\(7\)
cisco telepresence_system_software 1.9.6
cisco telepresence_system_software 1.9.6\(2\)
cisco telepresence_system_software 6.0.0.1\(4\)
cisco telepresence_system_software 6.0.1\(50\)
cisco telepresence_system_software 6.0.2\(28\)
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.1
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 1.9.0.1\(3\)
cisco telepresence_system_software 1.9.1\(68\)
cisco telepresence_system_software 1.9.2
cisco telepresence_system_software 1.9.3
cisco telepresence_system_software 1.9.4
cisco telepresence_system_software 1.9.5
cisco telepresence_system_software 1.9.6
cisco telepresence_system_software 1.10.0
cisco telepresence_system_1300 -
cisco telepresence_system_1300-65 -
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_500-32 -
cisco telepresence_system_500-37 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E38912-F6E7-41F9-B113-C1B27AEF455F",
              "versionEndIncluding": "6.0.3\\(33\\)",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "68710E69-4FD8-4FED-9D7B-CE7317982E2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "00737930-5F3C-4274-9633-00B3837ED6BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "995E5365-B6C3-4A4A-9F14-EADD27C8B9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "20831FBF-99C9-4B02-A577-6D28CC2983DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34600183-7CCF-4424-8887-8EC9ADD1B09E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8C315F74-11D0-42EF-84F7-A9747A8C03E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18516CB9-5EE8-4CC3-ACC3-6A0DF29D1D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A03B63BB-9DE1-41F9-A993-8295C368F611",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35078524-0E13-4FDD-B6A1-8D8DDDD394B6",
              "versionEndIncluding": "1.10.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09D6BB57-FB29-4DBD-9974-7DE67695A416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6570B01-07EB-425B-91E7-70517889A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE52CFC-2DE3-4780-9471-BA2390070C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "68884D7C-6F29-4435-8904-C684959C9D4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DDA787-1F51-415A-BF59-B9EAAE69EA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BABEE2DD-7C86-4BD0-9928-DC370D3F786B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C69EA5-F5D2-4DC7-BE08-F0CBA967A249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E70952-7132-4F2B-932F-56FAD2A89A96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3094537-1152-4E51-A0C0-798A760A884A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63DF9134-97F0-4E13-ADB8-C40D67681EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E530C9D1-8ACD-4B32-A96D-60E94916A872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C8B085-E37B-4440-9DAD-EA1702D79A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence System Software v1.10.1 y anteriores en dispositivos 500, 13X0, 1X00, 30X0, y 3X00, y v6.0.3 y anteriores en dispositivos TX 9X00, tiene una contrase\u00f1a predeterminada de la cuenta pwrecovery, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos modificar la configuraci\u00f3n o realizar actos arbitrarios a trav\u00e9s de peticiones HTTPS, tambi\u00e9n conocido como Bug ID CSCui43128."
    }
  ],
  "id": "CVE-2013-3454",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-08-08T14:55:08.717",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-3362 (GCVE-0-2014-3362)

Vulnerability from cvelistv5 – Published: 2014-09-12 01:00 – Updated: 2024-08-06 10:43
VLAI?
Summary
Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:43:05.142Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140910 Cisco TelePresence System MXP Series Software Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
          },
          {
            "name": "cisco-telepresence-mxp-cve20143362-dos(95883)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
          },
          {
            "name": "61072",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61072"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140910 Cisco TelePresence System MXP Series Software Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
        },
        {
          "name": "cisco-telepresence-mxp-cve20143362-dos(95883)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
        },
        {
          "name": "61072",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61072"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-3362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140910 Cisco TelePresence System MXP Series Software Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
            },
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
            },
            {
              "name": "cisco-telepresence-mxp-cve20143362-dos(95883)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
            },
            {
              "name": "61072",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61072"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-3362",
    "datePublished": "2014-09-12T01:00:00",
    "dateReserved": "2014-05-07T00:00:00",
    "dateUpdated": "2024-08-06T10:43:05.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3274 (GCVE-0-2014-3274)

Vulnerability from cvelistv5 – Published: 2014-05-23 22:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:57.154Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
          },
          {
            "name": "20140521 Cisco TelePresence System Directory Information Disclosure Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
          },
          {
            "name": "1030272",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030272"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-09T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
        },
        {
          "name": "20140521 Cisco TelePresence System Directory Information Disclosure Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
        },
        {
          "name": "1030272",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030272"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-3274",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
            },
            {
              "name": "20140521 Cisco TelePresence System Directory Information Disclosure Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
            },
            {
              "name": "1030272",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030272"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-3274",
    "datePublished": "2014-05-23T22:00:00",
    "dateReserved": "2014-05-07T00:00:00",
    "dateUpdated": "2024-08-06T10:35:57.154Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2156 (GCVE-0-2014-2156)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:06:00.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2156",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:06:00.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2159 (GCVE-0-2014-2159)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.698Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2159",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2159",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2161 (GCVE-0-2014-2161)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.734Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2161",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.734Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2157 (GCVE-0-2014-2157)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.824Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2157",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2157",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.824Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2160 (GCVE-0-2014-2160)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.658Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2160",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2160",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.658Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2158 (GCVE-0-2014-2158)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2158",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2158",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0661 (GCVE-0-2014-0661)

Vulnerability from cvelistv5 – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:20
VLAI?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/102362 vdb-entryx_refsource_OSVDB
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/65071 vdb-entryx_refsource_BID
http://secunia.com/advisories/56533 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id/1029656 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:20:19.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102362"
          },
          {
            "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
          },
          {
            "name": "cisco-telepresence-cve20140661-command-exec(90624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
          },
          {
            "name": "65071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65071"
          },
          {
            "name": "56533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56533"
          },
          {
            "name": "1029656",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029656"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "102362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102362"
        },
        {
          "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
        },
        {
          "name": "cisco-telepresence-cve20140661-command-exec(90624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
        },
        {
          "name": "65071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65071"
        },
        {
          "name": "56533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56533"
        },
        {
          "name": "1029656",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029656"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-0661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102362"
            },
            {
              "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
            },
            {
              "name": "cisco-telepresence-cve20140661-command-exec(90624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
            },
            {
              "name": "65071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65071"
            },
            {
              "name": "56533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56533"
            },
            {
              "name": "1029656",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029656"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-0661",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-02T00:00:00",
    "dateUpdated": "2024-08-06T09:20:19.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3454 (GCVE-0-2013-3454)

Vulnerability from cvelistv5 – Published: 2013-08-08 14:00 – Updated: 2024-09-17 03:38
VLAI?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-08T14:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3454",
    "datePublished": "2013-08-08T14:00:00Z",
    "dateReserved": "2013-05-06T00:00:00Z",
    "dateUpdated": "2024-09-17T03:38:57.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3362 (GCVE-0-2014-3362)

Vulnerability from nvd – Published: 2014-09-12 01:00 – Updated: 2024-08-06 10:43
VLAI?
Summary
Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:43:05.142Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140910 Cisco TelePresence System MXP Series Software Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
          },
          {
            "name": "cisco-telepresence-mxp-cve20143362-dos(95883)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
          },
          {
            "name": "61072",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61072"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140910 Cisco TelePresence System MXP Series Software Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
        },
        {
          "name": "cisco-telepresence-mxp-cve20143362-dos(95883)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
        },
        {
          "name": "61072",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61072"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-3362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory leak in Cisco TelePresence System Edge MXP Series Software F9.3.3 and earlier allows remote attackers to cause a denial of service (management outage) via multiple TELNET connections, aka Bug ID CSCuo63677."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140910 Cisco TelePresence System MXP Series Software Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3362"
            },
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35674"
            },
            {
              "name": "cisco-telepresence-mxp-cve20143362-dos(95883)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95883"
            },
            {
              "name": "61072",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61072"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-3362",
    "datePublished": "2014-09-12T01:00:00",
    "dateReserved": "2014-05-07T00:00:00",
    "dateUpdated": "2024-08-06T10:43:05.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3274 (GCVE-0-2014-3274)

Vulnerability from nvd – Published: 2014-05-23 22:00 – Updated: 2024-08-06 10:35
VLAI?
Summary
Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:35:57.154Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
          },
          {
            "name": "20140521 Cisco TelePresence System Directory Information Disclosure Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
          },
          {
            "name": "1030272",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030272"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-09T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
        },
        {
          "name": "20140521 Cisco TelePresence System Directory Information Disclosure Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
        },
        {
          "name": "1030272",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030272"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-3274",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System (CTS) 6.0(.5)(5) and earlier falls back to HTTP when certain HTTPS sessions cannot be established, which allows man-in-the-middle attackers to obtain sensitive directory information by leveraging a network position between CTS and Cisco Unified Communications Manager (UCM) to block HTTPS traffic, aka Bug ID CSCuj26326."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34327"
            },
            {
              "name": "20140521 Cisco TelePresence System Directory Information Disclosure Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3274"
            },
            {
              "name": "1030272",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030272"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-3274",
    "datePublished": "2014-05-23T22:00:00",
    "dateReserved": "2014-05-07T00:00:00",
    "dateUpdated": "2024-08-06T10:35:57.154Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2156 (GCVE-0-2014-2156)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:06:00.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2156",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:06:00.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2159 (GCVE-0-2014-2159)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.698Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2159",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2159",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2161 (GCVE-0-2014-2161)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.734Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2161",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.734Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2157 (GCVE-0-2014-2157)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.824Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2157",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2157",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.824Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2160 (GCVE-0-2014-2160)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.658Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2160",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2160",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.658Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2158 (GCVE-0-2014-2158)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2158",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence System MXP Series",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2158",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0661 (GCVE-0-2014-0661)

Vulnerability from nvd – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:20
VLAI?
Summary
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/102362 vdb-entryx_refsource_OSVDB
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/65071 vdb-entryx_refsource_BID
http://secunia.com/advisories/56533 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id/1029656 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:20:19.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102362"
          },
          {
            "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
          },
          {
            "name": "cisco-telepresence-cve20140661-command-exec(90624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
          },
          {
            "name": "65071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65071"
          },
          {
            "name": "56533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56533"
          },
          {
            "name": "1029656",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029656"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "102362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102362"
        },
        {
          "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
        },
        {
          "name": "cisco-telepresence-cve20140661-command-exec(90624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
        },
        {
          "name": "65071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65071"
        },
        {
          "name": "56533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56533"
        },
        {
          "name": "1029656",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029656"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-0661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102362"
            },
            {
              "name": "20140122 Cisco TelePresence System Software Command Execution Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts"
            },
            {
              "name": "cisco-telepresence-cve20140661-command-exec(90624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
            },
            {
              "name": "65071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65071"
            },
            {
              "name": "56533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56533"
            },
            {
              "name": "1029656",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029656"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-0661",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-02T00:00:00",
    "dateUpdated": "2024-08-06T09:20:19.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3454 (GCVE-0-2013-3454)

Vulnerability from nvd – Published: 2013-08-08 14:00 – Updated: 2024-09-17 03:38
VLAI?
Summary
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-08T14:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130807 Cisco TelePresence System Default Credentials Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3454",
    "datePublished": "2013-08-08T14:00:00Z",
    "dateReserved": "2013-05-06T00:00:00Z",
    "dateUpdated": "2024-09-17T03:38:57.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}