Search criteria

51 vulnerabilities found for telepresence_te_software by cisco

FKIE_CVE-2015-0722

Vulnerability from fkie_nvd - Published: 2015-05-25 00:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
Impacted products
Vendor Product Version
cisco telepresence_tc_software 3.1.5
cisco telepresence_tc_software 3.1_base
cisco telepresence_tc_software 4.1.0
cisco telepresence_tc_software 4.1.1
cisco telepresence_tc_software 4.1.2
cisco telepresence_tc_software 4.1_base
cisco telepresence_tc_software 4.2.0
cisco telepresence_tc_software 4.2.1
cisco telepresence_tc_software 4.2.2
cisco telepresence_tc_software 4.2.3
cisco telepresence_tc_software 4.2.4
cisco telepresence_tc_software 4.2_base
cisco telepresence_tc_software 5.0.2
cisco telepresence_tc_software 5.0.2-cucm
cisco telepresence_tc_software 5.0_base
cisco telepresence_tc_software 5.1.3
cisco telepresence_tc_software 5.1.3-cucm
cisco telepresence_tc_software 5.1.4
cisco telepresence_tc_software 5.1.4-cucm
cisco telepresence_tc_software 5.1.5
cisco telepresence_tc_software 5.1.5-cucm
cisco telepresence_tc_software 5.1.6
cisco telepresence_tc_software 5.1.6-cucm
cisco telepresence_tc_software 5.1.7
cisco telepresence_tc_software 5.1.7-cucm
cisco telepresence_tc_software 5.1_base
cisco telepresence_tc_software 6.0.0
cisco telepresence_tc_software 6.0.0-cucm
cisco telepresence_tc_software 6.0.1
cisco telepresence_tc_software 6.0.1-cucm
cisco telepresence_tc_software 6.0.2
cisco telepresence_tc_software 6.0.3
cisco telepresence_tc_software 6.0_base
cisco telepresence_tc_software 6.1.0
cisco telepresence_tc_software 6.1.0-cucm
cisco telepresence_tc_software 6.1.1
cisco telepresence_tc_software 6.1.1-cucm
cisco telepresence_tc_software 6.1.2
cisco telepresence_tc_software 6.1.2-cucm
cisco telepresence_tc_software 6.1.3
cisco telepresence_tc_software 6.1.4
cisco telepresence_tc_software 6.1_base
cisco telepresence_tc_software 6.3.0
cisco telepresence_tc_software 6.3.1
cisco telepresence_tc_software 6.3.2
cisco telepresence_tc_software 6.3.3
cisco telepresence_tc_software 6.3.4
cisco telepresence_tc_software 7.1.0
cisco telepresence_tc_software 7.1.1
cisco telepresence_tc_software 7.1.2
cisco telepresence_tc_software 7.1.3
cisco telepresence_tc_software 7.1.4
cisco telepresence_tc_software 7.2.0
cisco telepresence_tc_software 7.2.1
cisco telepresence_tc_software 7.3.0
cisco telepresence_tc_software 7.3.1
cisco telepresence_te_software 6.0.0
cisco telepresence_te_software 6.0.1
cisco telepresence_te_software 6.0.2
cisco telepresence_te_software 6.0_base

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B5A78C8-E5BA-44B8-91EE-B07E400EE7E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6DD8580-644F-4640-8127-CC345DC5CDA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B32A35F-D1AF-490E-A1CB-612E5BC2E9DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72D4048-53D6-4B3A-8148-4C7F5354D3EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49545BCD-C2F3-46EC-9F77-34639054E46B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB8B703-A9BD-4A63-BC62-3F031440B00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "739D968B-C97E-4C1D-A4F0-CC1FA0956E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F63626-8F70-4EE8-80A7-24614640E2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98814197-69ED-414D-9B16-9E43C2244106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD0EDC3-3932-4DB2-9562-682808B20DD7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
    },
    {
      "lang": "es",
      "value": "Los controladores de red en Cisco TelePresence T, Cisco TelePresence TE, y Cisco TelePresence TC anterior a 7.3.2 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de proceso o recarga de dispositivo) a trav\u00e9s de una inundaci\u00f3n de paquetes IP manipulados, tambi\u00e9n conocido como Bug ID CSCuj68952."
    }
  ],
  "id": "CVE-2015-0722",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-05-25T00:59:02.637",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2174

Vulnerability from fkie_nvd - Published: 2015-05-25 00:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
Impacted products
Vendor Product Version
cisco telepresence_tc_software 3.1.5
cisco telepresence_tc_software 3.1_base
cisco telepresence_tc_software 4.1.0
cisco telepresence_tc_software 4.1.1
cisco telepresence_tc_software 4.1.2
cisco telepresence_tc_software 4.1_base
cisco telepresence_tc_software 4.2.0
cisco telepresence_tc_software 4.2.1
cisco telepresence_tc_software 4.2.2
cisco telepresence_tc_software 4.2.3
cisco telepresence_tc_software 4.2.4
cisco telepresence_tc_software 4.2_base
cisco telepresence_tc_software 5.0.2
cisco telepresence_tc_software 5.0.2-cucm
cisco telepresence_tc_software 5.0_base
cisco telepresence_tc_software 5.1.3
cisco telepresence_tc_software 5.1.3-cucm
cisco telepresence_tc_software 5.1.4
cisco telepresence_tc_software 5.1.4-cucm
cisco telepresence_tc_software 5.1.5
cisco telepresence_tc_software 5.1.5-cucm
cisco telepresence_tc_software 5.1.6
cisco telepresence_tc_software 5.1.6-cucm
cisco telepresence_tc_software 5.1.7
cisco telepresence_tc_software 5.1.7-cucm
cisco telepresence_tc_software 5.1_base
cisco telepresence_tc_software 6.0.0
cisco telepresence_tc_software 6.0.0-cucm
cisco telepresence_tc_software 6.0.1
cisco telepresence_tc_software 6.0.1-cucm
cisco telepresence_tc_software 6.0.2
cisco telepresence_tc_software 6.0_base
cisco telepresence_tc_software 6.1.0
cisco telepresence_tc_software 6.1.0-cucm
cisco telepresence_tc_software 6.1.1
cisco telepresence_tc_software 6.1.1-cucm
cisco telepresence_tc_software 6.1.2
cisco telepresence_tc_software 6.1.2-cucm
cisco telepresence_tc_software 6.1_base
cisco telepresence_tc_software 6.3.0
cisco telepresence_te_software 6.0.0
cisco telepresence_te_software 6.0.1
cisco telepresence_te_software 6.0.2
cisco telepresence_te_software 6.0_base

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F63626-8F70-4EE8-80A7-24614640E2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "98814197-69ED-414D-9B16-9E43C2244106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD0EDC3-3932-4DB2-9562-682808B20DD7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence T, TelePresence TE, y TelePresence TC anterior a 7.1 no implementan correctamente el control de acceso, lo que permite a atacantes remotos obtener privilegios root mediante el env\u00edo de paquetes en la red local y permite a atacantes f\u00edsicamente pr\u00f3ximos obtener privilegios root a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCub67651."
    }
  ],
  "id": "CVE-2014-2174",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-05-25T00:59:00.073",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2170

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence TC Software 4.x y 5.x anterior a 5.1.7 y 6.x anterior a 6.0.1 y TE Software 4.x y 6.0 permiten a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el uso de comandos como argumentos hacia scripts tshell (tambi\u00e9n conocido como tcsh), tambi\u00e9n conocido como Bug ID CSCue60202."
    }
  ],
  "id": "CVE-2014-2170",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.337",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2169

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence TC Software 4.x hasta 6.x anterior a 6.2.0 y TE Software 4.x y 6.0 permiten a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el uso de los comandos como argumentos hacia scripts de sistema internos, tambi\u00e9n conocido como Bug ID CSCue60211."
    }
  ],
  "id": "CVE-2014-2169",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.320",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2165

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCtq72699."
    }
  ],
  "id": "CVE-2014-2165",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.227",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2163

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCua64961."
    }
  ],
  "id": "CVE-2014-2163",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.180",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2167

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCua86589."
    }
  ],
  "id": "CVE-2014-2167",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.273",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2164

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCuj94651."
    }
  ],
  "id": "CVE-2014-2164",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.193",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2171

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en Cisco TelePresence TC Software 4.x hasta 6.x hasta 6.0.1 y TE Software 4.x y 6.0.x anterior a 6.0.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCud81796."
    }
  ],
  "id": "CVE-2014-2171",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.367",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2168

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes de respuesta DNS manipulados, tambi\u00e9n conocido como Bug ID CSCty44804."
    }
  ],
  "id": "CVE-2014-2168",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.287",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2166

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y TE Software 4.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCto70562."
    }
  ],
  "id": "CVE-2014-2166",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.240",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2172

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a usuarios locales ganar privilegios mediante el aprovechamiento del manejo indebido del indicador de compilador u-boot para archivos ejecutables internos, tambi\u00e9n conocido como Bug ID CSCub67693."
    }
  ],
  "id": "CVE-2014-2172",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.383",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2162

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCud29566."
    }
  ],
  "id": "CVE-2014-2162",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.147",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2173

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 no restringe debidamente acceso al puerto serie, lo que permite a usuarios locales ganar privilegios a trav\u00e9s de comandos no especificados, tambi\u00e9n conocido como Bug ID CSCub67692."
    }
  ],
  "id": "CVE-2014-2173",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.413",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-2175

Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849."
    },
    {
      "lang": "es",
      "value": "Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de paquetes H.225 manipulados, tambi\u00e9n conocido como Bug ID CSCtq78849."
    }
  ],
  "id": "CVE-2014-2175",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-02T10:55:08.430",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-2174 (GCVE-0-2014-2174)

Vulnerability from cvelistv5 – Published: 2015-05-25 00:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-25T00:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2174",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2174",
    "datePublished": "2015-05-25T00:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-0722 (GCVE-0-2015-0722)

Vulnerability from cvelistv5 – Published: 2015-05-25 00:00 – Updated: 2024-08-06 04:17
VLAI?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:17:32.824Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-25T00:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-0722",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-0722",
    "datePublished": "2015-05-25T00:00:00",
    "dateReserved": "2015-01-07T00:00:00",
    "dateUpdated": "2024-08-06T04:17:32.824Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2170 (GCVE-0-2014-2170)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2170",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2164 (GCVE-0-2014-2164)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.723Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2164",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2164",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.723Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2171 (GCVE-0-2014-2171)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2171",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2165 (GCVE-0-2014-2165)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2165",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2165",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.881Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2167 (GCVE-0-2014-2167)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:06:00.211Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2167",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2167",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:06:00.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2173 (GCVE-0-2014-2173)

Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:06:00.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2173",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:06:00.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2174 (GCVE-0-2014-2174)

Vulnerability from nvd – Published: 2015-05-25 00:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-25T00:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2174",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2174",
    "datePublished": "2015-05-25T00:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-0722 (GCVE-0-2015-0722)

Vulnerability from nvd – Published: 2015-05-25 00:00 – Updated: 2024-08-06 04:17
VLAI?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:17:32.824Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-25T00:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-0722",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-0722",
    "datePublished": "2015-05-25T00:00:00",
    "dateReserved": "2015-01-07T00:00:00",
    "dateUpdated": "2024-08-06T04:17:32.824Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2170 (GCVE-0-2014-2170)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2170",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2164 (GCVE-0-2014-2164)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.723Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2164",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2164",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.723Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2171 (GCVE-0-2014-2171)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2171",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2165 (GCVE-0-2014-2165)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2165",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2165",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.881Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2167 (GCVE-0-2014-2167)

Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:06:00.211Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-02T04:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2167",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2167",
    "datePublished": "2014-05-02T10:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:06:00.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}