Vulnerabilites related to cisco - telepresence_tc_software
cve-2014-2166
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2166", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3378
Vulnerability from cvelistv5
Published
2013-06-21 10:00
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC Software before 6.1 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (temporary device hang) via crafted SIP packets, aka Bug ID CSCuf89557.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software before 6.1 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (temporary device hang) via crafted SIP packets, aka Bug ID CSCuf89557." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-21T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3378", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software before 6.1 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (temporary device hang) via crafted SIP packets, aka Bug ID CSCuf89557." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3378", "datePublished": "2013-06-21T10:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T01:56:54.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3401
Vulnerability from cvelistv5
Published
2013-07-02 01:00
Modified
2024-09-17 03:32
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software allows remote attackers to trigger unintended use of NOTIFY messages via unspecified vectors, aka Bug ID CSCud96080.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130629 Cisco TC Software SIP Implementation Error May Affect Communications Integrity", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software allows remote attackers to trigger unintended use of NOTIFY messages via unspecified vectors, aka Bug ID CSCud96080." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-02T01:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130629 Cisco TC Software SIP Implementation Error May Affect Communications Integrity", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3401", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software allows remote attackers to trigger unintended use of NOTIFY messages via unspecified vectors, aka Bug ID CSCud96080." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130629 Cisco TC Software SIP Implementation Error May Affect Communications Integrity", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3401", "datePublished": "2013-07-02T01:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T03:32:36.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0697
Vulnerability from cvelistv5
Published
2015-04-15 10:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1032136 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=38350 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032136", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032136" }, { "name": "20150414 Cisco TelePresence Collaboration Desk and Room Endpoints HTML Redirect Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1032136", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032136" }, { "name": "20150414 Cisco TelePresence Collaboration Desk and Room Endpoints HTML Redirect Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0697", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032136", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032136" }, { "name": "20150414 Cisco TelePresence Collaboration Desk and Room Endpoints HTML Redirect Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0697", "datePublished": "2015-04-15T10:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-4271
Vulnerability from cvelistv5
Published
2015-07-15 18:00
Modified
2024-08-06 06:11
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1032931 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=39880 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:11:12.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032931", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032931" }, { "name": "20150714 Cisco TelePresence Integrator C Series Multiple Request Parameter Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39880" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1032931", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032931" }, { "name": "20150714 Cisco TelePresence Integrator C Series Multiple Request Parameter Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39880" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-4271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032931", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032931" }, { "name": "20150714 Cisco TelePresence Integrator C Series Multiple Request Parameter Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39880" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-4271", "datePublished": "2015-07-15T18:00:00", "dateReserved": "2015-06-04T00:00:00", "dateUpdated": "2024-08-06T06:11:12.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0696
Vulnerability from cvelistv5
Published
2015-04-15 10:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the login page in Cisco TC Software before 7.1.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuq94977.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/viewAlert.x?alertId=38349 | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1032137 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150414 Cisco TelePresence Collaboration Desk and Room Endpoints Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349" }, { "name": "1032137", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032137" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the login page in Cisco TC Software before 7.1.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuq94977." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20150414 Cisco TelePresence Collaboration Desk and Room Endpoints Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349" }, { "name": "1032137", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032137" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the login page in Cisco TC Software before 7.1.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuq94977." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150414 Cisco TelePresence Collaboration Desk and Room Endpoints Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349" }, { "name": "1032137", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032137" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0696", "datePublished": "2015-04-15T10:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2175
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2175", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2175", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2172
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2172", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2167
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2167", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2167", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:06:00.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3379
Vulnerability from cvelistv5
Published
2013-06-21 10:00
Modified
2024-09-16 18:08
Severity ?
EPSS score ?
Summary
The firewall subsystem in Cisco TelePresence TC Software before 4.2 does not properly implement rules that grant access to hosts, which allows remote attackers to obtain shell access with root privileges by leveraging connectivity to the management network, aka Bug ID CSCts37781.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:38.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The firewall subsystem in Cisco TelePresence TC Software before 4.2 does not properly implement rules that grant access to hosts, which allows remote attackers to obtain shell access with root privileges by leveraging connectivity to the management network, aka Bug ID CSCts37781." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-21T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The firewall subsystem in Cisco TelePresence TC Software before 4.2 does not properly implement rules that grant access to hosts, which allows remote attackers to obtain shell access with root privileges by leveraging connectivity to the management network, aka Bug ID CSCts37781." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3379", "datePublished": "2013-06-21T10:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-16T18:08:43.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2169
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2169", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2170
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2170", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2170", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2165
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2165", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2163
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2163", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2168
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2168", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2168", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2173
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2173", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:06:00.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2174
Vulnerability from cvelistv5
Published
2015-05-25 00:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-25T00:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2174", "datePublished": "2015-05-25T00:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0770
Vulnerability from cvelistv5
Published
2015-06-07 18:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1032511 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/viewAlert.x?alertId=39210 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032511", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032511" }, { "name": "20150605 Cisco TelePresence SX20 HTTP Response Splitting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39210" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1032511", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032511" }, { "name": "20150605 Cisco TelePresence SX20 HTTP Response Splitting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39210" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0770", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032511", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032511" }, { "name": "20150605 Cisco TelePresence SX20 HTTP Response Splitting Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39210" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0770", "datePublished": "2015-06-07T18:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6648
Vulnerability from cvelistv5
Published
2017-06-08 13:00
Modified
2024-08-05 15:33
Severity ?
EPSS score ?
Summary
A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98934 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038624 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco TelePresence Endpoint Denial of Service Vulnerability |
Version: Cisco TelePresence Endpoint Denial of Service Vulnerability |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:33:20.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele" }, { "name": "98934", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98934" }, { "name": "1038624", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038624" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco TelePresence Endpoint Denial of Service Vulnerability", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco TelePresence Endpoint Denial of Service Vulnerability" } ] } ], "datePublic": "2017-06-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-07T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele" }, { "name": "98934", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98934" }, { "name": "1038624", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038624" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6648", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco TelePresence Endpoint Denial of Service Vulnerability", "version": { "version_data": [ { "version_value": "Cisco TelePresence Endpoint Denial of Service Vulnerability" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele" }, { "name": "98934", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98934" }, { "name": "1038624", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038624" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6648", "datePublished": "2017-06-08T13:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:33:20.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1387
Vulnerability from cvelistv5
Published
2016-05-05 21:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, aka Bug ID CSCuz26935.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1035744 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160504 Cisco TelePresence XML Application Programming Interface Authentication Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "name": "1035744", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035744" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, aka Bug ID CSCuz26935." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-29T16:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20160504 Cisco TelePresence XML Application Programming Interface Authentication Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "name": "1035744", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035744" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, aka Bug ID CSCuz26935." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160504 Cisco TelePresence XML Application Programming Interface Authentication Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "name": "1035744", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035744" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1387", "datePublished": "2016-05-05T21:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6459
Vulnerability from cvelistv5
Published
2016-11-19 02:45
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94075 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037187 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco TelePresence CE and TC 8.1.x |
Version: Cisco TelePresence CE and TC 8.1.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:20.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp" }, { "name": "94075", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94075" }, { "name": "1037187", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco TelePresence CE and TC 8.1.x", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco TelePresence CE and TC 8.1.x" } ] } ], "datePublic": "2016-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0." } ], "problemTypes": [ { "descriptions": [ { "description": "unspecified", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp" }, { "name": "94075", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94075" }, { "name": "1037187", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-6459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco TelePresence CE and TC 8.1.x", "version": { "version_data": [ { "version_value": "Cisco TelePresence CE and TC 8.1.x" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "unspecified" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp" }, { "name": "94075", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94075" }, { "name": "1037187", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037187" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-6459", "datePublished": "2016-11-19T02:45:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:20.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2171
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2171", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3405
Vulnerability from cvelistv5
Published
2013-07-10 20:00
Modified
2024-09-17 00:57
Severity ?
EPSS score ?
Summary
The web portal in TC software on Cisco TelePresence endpoints does not require an exact password match during a login attempt by a user who has not configured a password, which allows remote attackers to bypass authentication by sending an arbitrary password, aka Bug ID CSCud96071.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130710 Cisco TC Software Improper Validation of Empty Password", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The web portal in TC software on Cisco TelePresence endpoints does not require an exact password match during a login attempt by a user who has not configured a password, which allows remote attackers to bypass authentication by sending an arbitrary password, aka Bug ID CSCud96071." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-10T20:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130710 Cisco TC Software Improper Validation of Empty Password", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3405", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web portal in TC software on Cisco TelePresence endpoints does not require an exact password match during a login attempt by a user who has not configured a password, which allows remote attackers to bypass authentication by sending an arbitrary password, aka Bug ID CSCud96071." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130710 Cisco TC Software Improper Validation of Empty Password", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3405", "datePublished": "2013-07-10T20:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T00:57:08.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2162
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2162", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:06:00.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3377
Vulnerability from cvelistv5
Published
2013-06-21 10:00
Modified
2024-09-17 03:18
Severity ?
EPSS score ?
Summary
Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-21T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3377", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3377", "datePublished": "2013-06-21T10:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T03:18:46.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0722
Vulnerability from cvelistv5
Published
2015-05-25 00:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-25T00:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0722", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0722", "datePublished": "2015-05-25T00:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2164
Vulnerability from cvelistv5
Published
2014-05-02 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-02T04:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2164", "datePublished": "2014-05-02T10:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2015-05-25 00:59
Modified
2024-11-21 02:05
Severity ?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*", "matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "20F63626-8F70-4EE8-80A7-24614640E2CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "98814197-69ED-414D-9B16-9E43C2244106", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "ABD0EDC3-3932-4DB2-9562-682808B20DD7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651." }, { "lang": "es", "value": "Cisco TelePresence T, TelePresence TE, y TelePresence TC anterior a 7.1 no implementan correctamente el control de acceso, lo que permite a atacantes remotos obtener privilegios root mediante el env\u00edo de paquetes en la red local y permite a atacantes f\u00edsicamente pr\u00f3ximos obtener privilegios root a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCub67651." } ], "id": "CVE-2014-2174", "lastModified": "2024-11-21T02:05:47.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-25T00:59:00.073", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-11-19 03:03
Modified
2024-11-21 02:56
Severity ?
Summary
Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 7.1.0 | |
cisco | telepresence_tc_software | 7.1.1 | |
cisco | telepresence_tc_software | 7.1.2 | |
cisco | telepresence_tc_software | 7.1.3 | |
cisco | telepresence_tc_software | 7.1.4 | |
cisco | telepresence_tc_software | 7.3.0 | |
cisco | telepresence_tc_software | 7.3.1 | |
cisco | telepresence_tc_software | 7.3.2 | |
cisco | telepresence_tc_software | 7.3.3 | |
cisco | telepresence_tc_software | 8.0.0 | |
cisco | telepresence_tc_software | 8.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3501B65-DF7C-4E58-894A-E0280A68DA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "35BCB121-C70F-44BC-80EE-415BDCF0E3FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7217AEE6-8BE5-46AC-8972-F7BDD1E48B3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBF60AFA-2B8A-4810-8E7C-E80E5294DCC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0." }, { "lang": "es", "value": "Los puntos finales de Cisco TelePresence que ejecutan cualquiera de los software CE o TC contienen una vulnerabilidad que podr\u00eda permitir a un atacante local autenticado ejecutar una inyecci\u00f3n de comando shell local. M\u00e1s informaci\u00f3n: CSCvb25010. Lanzamientos conocidos afectados: 8.1.x. Lanzamientos conocidos solucionados: 6.3.4 7.3.7 8.2.2 8.3.0." } ], "id": "CVE-2016-6459", "lastModified": "2024-11-21T02:56:10.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-11-19T03:03:02.507", "references": [ { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/94075" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1037187" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/94075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796." }, { "lang": "es", "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en Cisco TelePresence TC Software 4.x hasta 6.x hasta 6.0.1 y TE Software 4.x y 6.0.x anterior a 6.0.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCud81796." } ], "id": "CVE-2014-2171", "lastModified": "2024-11-21T02:05:47.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.367", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849." }, { "lang": "es", "value": "Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de paquetes H.225 manipulados, tambi\u00e9n conocido como Bug ID CSCtq78849." } ], "id": "CVE-2014-2175", "lastModified": "2024-11-21T02:05:47.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.430", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211." }, { "lang": "es", "value": "Cisco TelePresence TC Software 4.x hasta 6.x anterior a 6.2.0 y TE Software 4.x y 6.0 permiten a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el uso de los comandos como argumentos hacia scripts de sistema internos, tambi\u00e9n conocido como Bug ID CSCue60211." } ], "id": "CVE-2014-2169", "lastModified": "2024-11-21T02:05:46.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.320", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-15 18:59
Modified
2024-11-21 02:30
Severity ?
Summary
Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=39880 | Vendor Advisory | |
psirt@cisco.com | http://www.securitytracker.com/id/1032931 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=39880 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032931 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 7.3.0 | |
cisco | telepresence_tc_software | 7.3.1 | |
cisco | telepresence_tc_software | 7.3.2 | |
cisco | telepresence_tc_software | 7.3.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3501B65-DF7C-4E58-894A-E0280A68DA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "35BCB121-C70F-44BC-80EE-415BDCF0E3FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604." }, { "lang": "es", "value": "Cisco TelePresence TC anterior a 7.3.4 en dispositivos Integrator C permite a atacantes remotos eludir la autenticaci\u00f3n a trav\u00e9s de vectores que involucran m\u00faltiples par\u00e1metros de petici\u00f3n, tambi\u00e9n conocido como Bug ID CSCuv00604." } ], "id": "CVE-2015-4271", "lastModified": "2024-11-21T02:30:44.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-15T18:59:00.960", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39880" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032931" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-05-05 21:59
Modified
2024-11-21 02:46
Severity ?
Summary
The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, aka Bug ID CSCuz26935.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 7.2.0 | |
cisco | telepresence_tc_software | 7.2.1 | |
cisco | telepresence_tc_software | 7.3.0 | |
cisco | telepresence_tc_software | 7.3.1 | |
cisco | telepresence_tc_software | 7.3.2 | |
cisco | telepresence_tc_software | 7.3.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3501B65-DF7C-4E58-894A-E0280A68DA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "35BCB121-C70F-44BC-80EE-415BDCF0E3FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, aka Bug ID CSCuz26935." }, { "lang": "es", "value": "La API XML en TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4 y 7.3.5 y Collaboration Endpoint (CE) 8.0.0, 8.0.1 y 8.1.0 en Cisco TelePresence Software maneja incorrectamente la autenticaci\u00f3n, lo que permite a atacantes remotos ejecutar comandos de control o realizar cambios de configuraci\u00f3n a trav\u00e9s de una petici\u00f3n API, tambi\u00e9n conocido como Bug ID CSCuz26935." } ], "id": "CVE-2016-1387", "lastModified": "2024-11-21T02:46:20.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-05T21:59:04.423", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1035744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035744" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-02 03:43
Modified
2024-11-21 01:53
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software allows remote attackers to trigger unintended use of NOTIFY messages via unspecified vectors, aka Bug ID CSCud96080.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3F94F1D-C140-435D-850D-BA5288408C1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software allows remote attackers to trigger unintended use of NOTIFY messages via unspecified vectors, aka Bug ID CSCud96080." }, { "lang": "es", "value": "La implementaci\u00f3n de SIP en Cisco TelePresence TC Software permite a atacantes remotos provocar el uso no intencionado de mensajes NOTIFY a trav\u00e9s de vectores no especificados. Aka Bug ID CSCud96080." } ], "id": "CVE-2013-3401", "lastModified": "2024-11-21T01:53:33.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-02T03:43:34.677", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3401" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-10 20:55
Modified
2024-11-21 01:53
Severity ?
Summary
The web portal in TC software on Cisco TelePresence endpoints does not require an exact password match during a login attempt by a user who has not configured a password, which allows remote attackers to bypass authentication by sending an arbitrary password, aka Bug ID CSCud96071.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3F94F1D-C140-435D-850D-BA5288408C1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web portal in TC software on Cisco TelePresence endpoints does not require an exact password match during a login attempt by a user who has not configured a password, which allows remote attackers to bypass authentication by sending an arbitrary password, aka Bug ID CSCud96071." }, { "lang": "es", "value": "El portal web en TC software en Cisco TelePresence no requiere una coincidencia exacta con el password durante un intento de login por un usuario que no ha configurado un password, lo que permite a atacantes remotos eludir la autenticaci\u00f3n mediante el env\u00edo de passwords arbitrarios. Tambi\u00e9n conocido como Bug ID CSCud96071." } ], "id": "CVE-2013-3405", "lastModified": "2024-11-21T01:53:34.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-10T20:55:02.107", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3405" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-21 13:57
Modified
2024-11-21 01:53
Severity ?
Summary
The firewall subsystem in Cisco TelePresence TC Software before 4.2 does not properly implement rules that grant access to hosts, which allows remote attackers to obtain shell access with root privileges by leveraging connectivity to the management network, aka Bug ID CSCts37781.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | * | |
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1F3D57E-0459-43FC-9134-93F715041E3C", "versionEndIncluding": "4.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The firewall subsystem in Cisco TelePresence TC Software before 4.2 does not properly implement rules that grant access to hosts, which allows remote attackers to obtain shell access with root privileges by leveraging connectivity to the management network, aka Bug ID CSCts37781." }, { "lang": "es", "value": "El subsistema de firewall en Cisco TelePresence TC Software anterior a v4.2 no implementa correctamente reglas que conceden el acceso a los hosts, lo que permite a atacantes remotos obtener shell con privilegios de root mediante el aprovechamiento de la conectividad a la red de gesti\u00f3n, tambi\u00e9n conocido como Bug ID CSCts37781." } ], "id": "CVE-2013-3379", "lastModified": "2024-11-21T01:53:31.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-21T13:57:25.660", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-15 10:59
Modified
2024-11-21 02:23
Severity ?
Summary
Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=38350 | Vendor Advisory | |
psirt@cisco.com | http://www.securitytracker.com/id/1032136 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=38350 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032136 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 6.0.0 | |
cisco | telepresence_tc_software | 6.0.0-cucm | |
cisco | telepresence_tc_software | 6.0.1 | |
cisco | telepresence_tc_software | 6.0.1-cucm | |
cisco | telepresence_tc_software | 6.0.2 | |
cisco | telepresence_tc_software | 6.0_base | |
cisco | telepresence_tc_software | 6.1.0 | |
cisco | telepresence_tc_software | 6.1.0-cucm | |
cisco | telepresence_tc_software | 6.1.1 | |
cisco | telepresence_tc_software | 6.1.1-cucm | |
cisco | telepresence_tc_software | 6.1.2 | |
cisco | telepresence_tc_software | 6.1.2-cucm | |
cisco | telepresence_tc_software | 6.1_base | |
cisco | telepresence_tc_software | 6.3_base | |
cisco | telepresence_tc_software | 7.2_base |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "94C1BE25-C013-474A-AAAF-B978A781A8F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "583F9A48-26EC-46C5-92D8-EB6D897DA667", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E120C710-F9E2-471F-A5FD-E6B805F39871", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "B0F633CE-62D7-4731-88BE-DEA5165CF5B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "974D9FF9-A0EA-4F49-863E-4458638E9129", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "BF99E657-F09A-42E0-B404-6583D18C7882", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "94A7425C-81B4-4263-9C84-1117228EFD97", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "7E9645A3-DAAA-45B0-98E8-81D65E8E944C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DE7FFEC-7339-48F1-9413-D751565D9DF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "3F1F3C1E-DF98-41FB-B48D-B423989182E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4419044-A799-459F-ABE1-C44A928221DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "C1B924E4-442D-4F1C-954B-745235B3C896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "79011B2C-E3D9-4258-A1B8-941DAC04D0EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:6.3_base:*:*:*:*:*:*:*", "matchCriteriaId": "D385E100-3809-4257-9CD0-379EE1BDF584", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_tc_software:7.2_base:*:*:*:*:*:*:*", "matchCriteriaId": "9BC46370-9EC4-4318-9665-A311763A17C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980." }, { "lang": "es", "value": "Vulnerabilidad de la redirecci\u00f3n abierta en la p\u00e1gina de login en Cisco TC Software anterior a 6.3-26 y 7.x anterior a 7.3.0 en dispositivos Cisco TelePresence Collaboration Desk and Room Endpoints permite a atacantes remotos redirigir usuarios hacia sitios web arbitrarios y llevar a cabo ataques de phishing a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCuq94980." } ], "id": "CVE-2015-0697", "lastModified": "2024-11-21T02:23:33.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-04-15T10:59:03.533", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032136" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y TE Software 4.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCto70562." } ], "id": "CVE-2014-2166", "lastModified": "2024-11-21T02:05:46.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.240", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-07 18:59
Modified
2024-11-21 02:23
Severity ?
Summary
CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=39210 | Vendor Advisory | |
psirt@cisco.com | http://www.securitytracker.com/id/1032511 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=39210 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032511 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 6.3.0 | |
cisco | telepresence_tc_software | 6.3.1 | |
cisco | telepresence_tc_software | 6.3.2 | |
cisco | telepresence_tc_software | 6.3.3 | |
cisco | telepresence_tc_software | 7.1.0 | |
cisco | telepresence_tc_software | 7.1.1 | |
cisco | telepresence_tc_software | 7.1.2 | |
cisco | telepresence_tc_software | 7.1.3 | |
cisco | telepresence_tc_software | 7.1.4 | |
cisco | telepresence_tc_software | 7.2.0 | |
cisco | telepresence_tc_software | 7.2.1 | |
cisco | telepresence_tc_software | 7.3.0 | |
cisco | telepresence_tc_software | 7.3.1 | |
cisco | telepresence_tc_software | 7.3.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72D4048-53D6-4B3A-8148-4C7F5354D3EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "49545BCD-C2F3-46EC-9F77-34639054E46B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1CB8B703-A9BD-4A63-BC62-3F031440B00F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3501B65-DF7C-4E58-894A-E0280A68DA62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n CRLF en Cisco TelePresence TC 6.x anterior a 6.3.4 y 7.x anterior a 7.3.3 en los dispositivos Integrator C SX20 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y realizar ataques de la divisi\u00f3n de respuestas HTTP a trav\u00e9s de una URL manipulada, tambi\u00e9n conocido como Bug ID CSCut79341." } ], "id": "CVE-2015-0770", "lastModified": "2024-11-21T02:23:41.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-07T18:59:05.470", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39210" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032511" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-93" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693." }, { "lang": "es", "value": "Desbordamiento de buffer en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a usuarios locales ganar privilegios mediante el aprovechamiento del manejo indebido del indicador de compilador u-boot para archivos ejecutables internos, tambi\u00e9n conocido como Bug ID CSCub67693." } ], "id": "CVE-2014-2172", "lastModified": "2024-11-21T02:05:47.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 2.7, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.383", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-05-25 00:59
Modified
2024-11-21 02:23
Severity ?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*", "matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B5A78C8-E5BA-44B8-91EE-B07E400EE7E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6DD8580-644F-4640-8127-CC345DC5CDA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8B32A35F-D1AF-490E-A1CB-612E5BC2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72D4048-53D6-4B3A-8148-4C7F5354D3EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "49545BCD-C2F3-46EC-9F77-34639054E46B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1CB8B703-A9BD-4A63-BC62-3F031440B00F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "739D968B-C97E-4C1D-A4F0-CC1FA0956E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "20F63626-8F70-4EE8-80A7-24614640E2CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "98814197-69ED-414D-9B16-9E43C2244106", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "ABD0EDC3-3932-4DB2-9562-682808B20DD7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952." }, { "lang": "es", "value": "Los controladores de red en Cisco TelePresence T, Cisco TelePresence TE, y Cisco TelePresence TC anterior a 7.3.2 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de proceso o recarga de dispositivo) a trav\u00e9s de una inundaci\u00f3n de paquetes IP manipulados, tambi\u00e9n conocido como Bug ID CSCuj68952." } ], "id": "CVE-2015-0722", "lastModified": "2024-11-21T02:23:36.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-25T00:59:02.637", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 | |
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692." }, { "lang": "es", "value": "Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 no restringe debidamente acceso al puerto serie, lo que permite a usuarios locales ganar privilegios a trav\u00e9s de comandos no especificados, tambi\u00e9n conocido como Bug ID CSCub67692." } ], "id": "CVE-2014-2173", "lastModified": "2024-11-21T02:05:47.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.413", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 | |
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCuj94651." } ], "id": "CVE-2014-2164", "lastModified": "2024-11-21T02:05:46.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.193", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 | |
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCtq72699." } ], "id": "CVE-2014-2165", "lastModified": "2024-11-21T02:05:46.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.227", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 | |
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804." }, { "lang": "es", "value": "Desbordamiento de buffer en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes de respuesta DNS manipulados, tambi\u00e9n conocido como Bug ID CSCty44804." } ], "id": "CVE-2014-2168", "lastModified": "2024-11-21T02:05:46.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.287", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 | |
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 6.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202." }, { "lang": "es", "value": "Cisco TelePresence TC Software 4.x y 5.x anterior a 5.1.7 y 6.x anterior a 6.0.1 y TE Software 4.x y 6.0 permiten a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el uso de comandos como argumentos hacia scripts tshell (tambi\u00e9n conocido como tcsh), tambi\u00e9n conocido como Bug ID CSCue60202." } ], "id": "CVE-2014-2170", "lastModified": "2024-11-21T02:05:47.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.337", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-21 13:57
Modified
2024-11-21 01:53
Severity ?
Summary
Cisco TelePresence TC Software before 6.1 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (temporary device hang) via crafted SIP packets, aka Bug ID CSCuf89557.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | * | |
cisco | telepresence_tc_software | 6.0.0 | |
cisco | telepresence_te_software | * | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0D564F3-93AE-44DF-92C7-A43FB66F60E4", "versionEndIncluding": "6.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CD062-2DC4-4BED-A086-D10FC4621D7A", "versionEndIncluding": "4.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software before 6.1 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (temporary device hang) via crafted SIP packets, aka Bug ID CSCuf89557." }, { "lang": "es", "value": "Cisco TelePresence TC Software anterior a v6.1 y TE Software anterior a v4.1.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (cuelgue temporal del dispositivo) mediante paquetes SIP especialmente dise\u00f1ados, tambi\u00e9n conocido como Bug ID CSCuf89557." } ], "id": "CVE-2013-3378", "lastModified": "2024-11-21T01:53:30.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-21T13:57:25.640", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCua64961." } ], "id": "CVE-2014-2163", "lastModified": "2024-11-21T02:05:46.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.180", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCud29566." } ], "id": "CVE-2014-2162", "lastModified": "2024-11-21T02:05:46.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.147", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-15 10:59
Modified
2024-11-21 02:23
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the login page in Cisco TC Software before 7.1.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuq94977.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=38349 | Vendor Advisory | |
psirt@cisco.com | http://www.securitytracker.com/id/1032137 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=38349 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032137 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 6.0.0 | |
cisco | telepresence_tc_software | 6.0.0-cucm | |
cisco | telepresence_tc_software | 6.0.1 | |
cisco | telepresence_tc_software | 6.0.1-cucm | |
cisco | telepresence_tc_software | 6.0.2 | |
cisco | telepresence_tc_software | 6.0_base | |
cisco | telepresence_tc_software | 6.1.0 | |
cisco | telepresence_tc_software | 6.1.0-cucm | |
cisco | telepresence_tc_software | 6.1.1 | |
cisco | telepresence_tc_software | 6.1.1-cucm | |
cisco | telepresence_tc_software | 6.1.2 | |
cisco | telepresence_tc_software | 6.1.2-cucm | |
cisco | telepresence_tc_software | 6.1_base | |
cisco | telepresence_tc_software | 6.3_base |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3_base:*:*:*:*:*:*:*", "matchCriteriaId": "BB60A756-C606-4CE6-8C6A-3D51E8C34E41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the login page in Cisco TC Software before 7.1.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuq94977." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la p\u00e1gina de login en Cisco TC Software anterior a 7.1.0 en dispositivos Cisco TelePresence Collaboration Desk and Room Endpoints permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCuq94977." } ], "id": "CVE-2015-0696", "lastModified": "2024-11-21T02:23:33.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-04-15T10:59:02.423", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032137" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-08 13:29
Modified
2024-11-21 03:30
Severity ?
Summary
A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_ce_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7981082F-B80B-49A5-8AAE-BFA377ED9460", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*", "matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "3D9C5EE1-0733-499E-92D0-4CFFFD370E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "9B046A6F-BEAA-4052-8896-0FA33B6BEEE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B5A78C8-E5BA-44B8-91EE-B07E400EE7E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F177059-DA78-4F84-AA72-B6C5CA212BD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6DD8580-644F-4640-8127-CC345DC5CDA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8B32A35F-D1AF-490E-A1CB-612E5BC2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72D4048-53D6-4B3A-8148-4C7F5354D3EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "49545BCD-C2F3-46EC-9F77-34639054E46B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1CB8B703-A9BD-4A63-BC62-3F031440B00F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "739D968B-C97E-4C1D-A4F0-CC1FA0956E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B9063887-80F9-4898-8F69-36178D9C4BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3501B65-DF7C-4E58-894A-E0280A68DA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "35BCB121-C70F-44BC-80EE-415BDCF0E3FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300EE45-2582-41E9-9F7F-4CB81D51E964", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "8CB135B8-A4D2-4DDA-96F4-B3149441567B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6BAF-3133-47A9-9149-FD92BE55C130", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCD1A653-986F-472F-A9B0-904653661DBE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002." }, { "lang": "es", "value": "Una vulnerabilidad en Session Initiation Protocol (SIP) del programa TelePresence Codec (TC) y Collaboration Endpoint (CE) de Cisco, podr\u00eda permitir a un atacante remoto no identificado causar que un endpoint de TelePresence se vuelva a cargar inesperadamente, resultado una condici\u00f3n denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a la falta de mecanismos de control de flujo dentro del programa. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un flujo de paquetes INVITE de SIP hacia el dispositivo afectado. Una vulnerabilidad podr\u00eda permitir al atacante afectar la disponibilidad de los servicios y datos del dispositivo, incluida una condici\u00f3n DoS completa. Esta vulnerabilidad afecta a las siguientes plataformas TC y CE de Cisco cuando se ejecutan versiones de programas anteriores a TC 7.3.8 y CE 8.3.0. IDs de Bug de Cisco: CSCux94002." } ], "id": "CVE-2017-6648", "lastModified": "2024-11-21T03:30:13.017", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-08T13:29:00.517", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98934" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1038624" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-21 13:57
Modified
2024-11-21 01:53
Severity ?
Summary
Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D79CCC-6C2D-48ED-A377-96C11B52E1F5", "versionEndIncluding": "5.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87CEA3A-2CF3-48DF-935F-31553CAC1ED8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0754B77C-E888-461E-AA1E-74B78DA59B78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BFF6AA3-4850-40A3-8211-82F60F14ACD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex60:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2E19CC-A0CF-4A06-A8DC-85C056346F68", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex90:-:*:*:*:*:*:*:*", "matchCriteriaId": "B508A1D2-4905-4AA0-A65C-DD4C4FD0A64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx200:-:*:*:*:*:*:*:*", "matchCriteriaId": "392D3BBE-8C2D-4643-95DB-79CF5CEDBC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx300:-:*:*:*:*:*:*:*", "matchCriteriaId": "63ED55F5-C88A-463D-9D5D-347D8C85AC43", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "5898916F-DFF0-4474-A704-8330B6DC8056", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "28E0F948-CD09-4A2D-A2BB-0FC16D7A023F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_c20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB9081F-3B87-4D60-AD41-7EE977BCA017", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_sx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DF7B58-4E88-497B-A1D8-A0E23A6B6223", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CD062-2DC4-4BED-A086-D10FC4621D7A", "versionEndIncluding": "4.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87CEA3A-2CF3-48DF-935F-31553CAC1ED8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0754B77C-E888-461E-AA1E-74B78DA59B78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BFF6AA3-4850-40A3-8211-82F60F14ACD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex60:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2E19CC-A0CF-4A06-A8DC-85C056346F68", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex90:-:*:*:*:*:*:*:*", "matchCriteriaId": "B508A1D2-4905-4AA0-A65C-DD4C4FD0A64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx200:-:*:*:*:*:*:*:*", "matchCriteriaId": "392D3BBE-8C2D-4643-95DB-79CF5CEDBC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx300:-:*:*:*:*:*:*:*", "matchCriteriaId": "63ED55F5-C88A-463D-9D5D-347D8C85AC43", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "5898916F-DFF0-4474-A704-8330B6DC8056", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "28E0F948-CD09-4A2D-A2BB-0FC16D7A023F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_c20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB9081F-3B87-4D60-AD41-7EE977BCA017", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_sx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DF7B58-4E88-497B-A1D8-A0E23A6B6223", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743." }, { "lang": "es", "value": "Cisco TelePresence TC Software anterior a v5.1.7 y TE Software anterior a v4.1.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) mediante paquetes SIP especialmente dise\u00f1ados, tambi\u00e9n conocido como Bug ID CSCue01743." } ], "id": "CVE-2013-3377", "lastModified": "2024-11-21T01:53:30.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-21T13:57:25.623", "references": [ { "source": "psirt@cisco.com", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-02 10:55
Modified
2024-11-21 02:05
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_tc_software | 4.0.0 | |
cisco | telepresence_tc_software | 4.0.1 | |
cisco | telepresence_tc_software | 4.0.4 | |
cisco | telepresence_tc_software | 4.1.1 | |
cisco | telepresence_tc_software | 4.1.2 | |
cisco | telepresence_tc_software | 4.2.0 | |
cisco | telepresence_tc_software | 4.2.1 | |
cisco | telepresence_tc_software | 4.2.2 | |
cisco | telepresence_tc_software | 4.2.3 | |
cisco | telepresence_tc_software | 4.2.4 | |
cisco | telepresence_tc_software | 5.0.0 | |
cisco | telepresence_tc_software | 5.0.1 | |
cisco | telepresence_tc_software | 5.0.2 | |
cisco | telepresence_tc_software | 5.1.0 | |
cisco | telepresence_tc_software | 5.1.1 | |
cisco | telepresence_tc_software | 5.1.2 | |
cisco | telepresence_tc_software | 5.1.3 | |
cisco | telepresence_tc_software | 5.1.4 | |
cisco | telepresence_tc_software | 5.1.5 | |
cisco | telepresence_tc_software | 5.1.6 | |
cisco | telepresence_tc_software | 5.1.7 | |
cisco | telepresence_te_software | 4.1.0 | |
cisco | telepresence_te_software | 4.1.1 | |
cisco | telepresence_te_software | 4.1.2 | |
cisco | telepresence_te_software | 4.1.3 | |
cisco | telepresence_te_software | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCua86589." } ], "id": "CVE-2014-2167", "lastModified": "2024-11-21T02:05:46.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-02T10:55:08.273", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }