Search criteria
51 vulnerabilities found for telepresence_te_software by cisco
FKIE_CVE-2015-0722
Vulnerability from fkie_nvd - Published: 2015-05-25 00:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*",
"matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*",
"matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9B5A78C8-E5BA-44B8-91EE-B07E400EE7E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*",
"matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6DD8580-644F-4640-8127-CC345DC5CDA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8B32A35F-D1AF-490E-A1CB-612E5BC2E9DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A72D4048-53D6-4B3A-8148-4C7F5354D3EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49545BCD-C2F3-46EC-9F77-34639054E46B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB8B703-A9BD-4A63-BC62-3F031440B00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "739D968B-C97E-4C1D-A4F0-CC1FA0956E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20F63626-8F70-4EE8-80A7-24614640E2CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "98814197-69ED-414D-9B16-9E43C2244106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0_base:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD0EDC3-3932-4DB2-9562-682808B20DD7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
},
{
"lang": "es",
"value": "Los controladores de red en Cisco TelePresence T, Cisco TelePresence TE, y Cisco TelePresence TC anterior a 7.3.2 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de proceso o recarga de dispositivo) a trav\u00e9s de una inundaci\u00f3n de paquetes IP manipulados, tambi\u00e9n conocido como Bug ID CSCuj68952."
}
],
"id": "CVE-2015-0722",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-05-25T00:59:02.637",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2174
Vulnerability from fkie_nvd - Published: 2015-05-25 00:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "21D19C90-19D2-46E5-BDA7-F7125F7A2878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "E88E8ECB-9A40-4B2A-B1E1-EB9CB69D322A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "357A8344-F77C-4D95-AFFC-930E3E177630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "03F8F06D-174D-4FEB-880F-825019FF2415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*",
"matchCriteriaId": "A6349908-7468-43BA-ACF2-4166FC95405C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "47981023-90C1-46D1-BCD6-6BE64364C5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*",
"matchCriteriaId": "83DB0369-FA22-43FE-9E0B-B370B44490B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "982DC39F-5FA0-4450-8C36-447270BFFC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "536F8A9D-59C6-42E4-B672-8B1D909F8535",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B1533-30F2-40AB-8429-2E7606EC06CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "32B5EEDB-7471-45C2-956B-466626E9EDD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "9729B0D4-F6E5-4683-947B-D73C6B147897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "BC20694E-FD91-4932-9AB5-1E1C8DD01BD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "B9056D02-E7C8-47B3-8CEF-E485CA6EC6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "70496628-EF39-4E54-BC9E-E2D9BDC00C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E50B4A0E-7851-4C1A-AAA7-2E4EF655056D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*",
"matchCriteriaId": "01392813-2BC7-4A4E-AF57-443E886E2643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "33CFCB77-65F1-48BF-8057-1F9C56BF7DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "9D68BFBE-50A4-4565-BCDA-29BF2B5B962C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*",
"matchCriteriaId": "4C12DD1C-DF28-4B4B-93FB-6E346D810BB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*",
"matchCriteriaId": "62C20678-F9B0-488C-B1B4-C04005F5E3FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20F63626-8F70-4EE8-80A7-24614640E2CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "98814197-69ED-414D-9B16-9E43C2244106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0_base:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD0EDC3-3932-4DB2-9562-682808B20DD7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
},
{
"lang": "es",
"value": "Cisco TelePresence T, TelePresence TE, y TelePresence TC anterior a 7.1 no implementan correctamente el control de acceso, lo que permite a atacantes remotos obtener privilegios root mediante el env\u00edo de paquetes en la red local y permite a atacantes f\u00edsicamente pr\u00f3ximos obtener privilegios root a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCub67651."
}
],
"id": "CVE-2014-2174",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-05-25T00:59:00.073",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2170
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 | |
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 6.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
},
{
"lang": "es",
"value": "Cisco TelePresence TC Software 4.x y 5.x anterior a 5.1.7 y 6.x anterior a 6.0.1 y TE Software 4.x y 6.0 permiten a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el uso de comandos como argumentos hacia scripts tshell (tambi\u00e9n conocido como tcsh), tambi\u00e9n conocido como Bug ID CSCue60202."
}
],
"id": "CVE-2014-2170",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.337",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2169
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5198E89F-9F04-4C1E-9EA9-EFE2C118788C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B421E06-5487-48FA-A602-2EC81C31F341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F940F7CF-D091-4212-8E9C-0FD538F00992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3C002A-8EA4-4731-A546-CA16E4D0BD0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to internal system scripts, aka Bug ID CSCue60211."
},
{
"lang": "es",
"value": "Cisco TelePresence TC Software 4.x hasta 6.x anterior a 6.2.0 y TE Software 4.x y 6.0 permiten a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el uso de los comandos como argumentos hacia scripts de sistema internos, tambi\u00e9n conocido como Bug ID CSCue60211."
}
],
"id": "CVE-2014-2169",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.320",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2165
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 | |
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
},
{
"lang": "es",
"value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCtq72699."
}
],
"id": "CVE-2014-2165",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.227",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2163
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 | |
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua64961."
},
{
"lang": "es",
"value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCua64961."
}
],
"id": "CVE-2014-2163",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.180",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2167
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 | |
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
},
{
"lang": "es",
"value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCua86589."
}
],
"id": "CVE-2014-2167",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.273",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2164
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 | |
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
},
{
"lang": "es",
"value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCuj94651."
}
],
"id": "CVE-2014-2164",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.193",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2171
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2083FC5B-B24C-49C9-B44B-29C9F9A27BD5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "856DDAE1-C3E6-4F70-946B-515F7B308517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en memoria din\u00e1mica en Cisco TelePresence TC Software 4.x hasta 6.x hasta 6.0.1 y TE Software 4.x y 6.0.x anterior a 6.0.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCud81796."
}
],
"id": "CVE-2014-2171",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.367",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2168
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 | |
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes de respuesta DNS manipulados, tambi\u00e9n conocido como Bug ID CSCty44804."
}
],
"id": "CVE-2014-2168",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.287",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2166
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCto70562."
},
{
"lang": "es",
"value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y TE Software 4.x permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCto70562."
}
],
"id": "CVE-2014-2166",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.240",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2172
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 | |
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a usuarios locales ganar privilegios mediante el aprovechamiento del manejo indebido del indicador de compilador u-boot para archivos ejecutables internos, tambi\u00e9n conocido como Bug ID CSCub67693."
}
],
"id": "CVE-2014-2172",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 2.7,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.383",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2162
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 | |
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566."
},
{
"lang": "es",
"value": "La implementaci\u00f3n SIP en Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCud29566."
}
],
"id": "CVE-2014-2162",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.147",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2173
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 | |
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692."
},
{
"lang": "es",
"value": "Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 no restringe debidamente acceso al puerto serie, lo que permite a usuarios locales ganar privilegios a trav\u00e9s de comandos no especificados, tambi\u00e9n conocido como Bug ID CSCub67692."
}
],
"id": "CVE-2014-2173",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.413",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2175
Vulnerability from fkie_nvd - Published: 2014-05-02 10:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | telepresence_tc_software | 4.0.0 | |
| cisco | telepresence_tc_software | 4.0.1 | |
| cisco | telepresence_tc_software | 4.0.4 | |
| cisco | telepresence_tc_software | 4.1.1 | |
| cisco | telepresence_tc_software | 4.1.2 | |
| cisco | telepresence_tc_software | 4.2.0 | |
| cisco | telepresence_tc_software | 4.2.1 | |
| cisco | telepresence_tc_software | 4.2.2 | |
| cisco | telepresence_tc_software | 4.2.3 | |
| cisco | telepresence_tc_software | 4.2.4 | |
| cisco | telepresence_tc_software | 5.0.0 | |
| cisco | telepresence_tc_software | 5.0.1 | |
| cisco | telepresence_tc_software | 5.0.2 | |
| cisco | telepresence_tc_software | 5.1.0 | |
| cisco | telepresence_tc_software | 5.1.1 | |
| cisco | telepresence_tc_software | 5.1.2 | |
| cisco | telepresence_tc_software | 5.1.3 | |
| cisco | telepresence_tc_software | 5.1.4 | |
| cisco | telepresence_tc_software | 5.1.5 | |
| cisco | telepresence_tc_software | 5.1.6 | |
| cisco | telepresence_tc_software | 5.1.7 | |
| cisco | telepresence_te_software | 4.1.0 | |
| cisco | telepresence_te_software | 4.1.1 | |
| cisco | telepresence_te_software | 4.1.2 | |
| cisco | telepresence_te_software | 4.1.3 | |
| cisco | telepresence_te_software | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66DB9D21-0443-4F03-B4A0-D9E06E9FCDAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "466B6D18-5F09-44AB-8CE4-12B8392112A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F74429A-6C70-48A4-B0D1-3D759E13A389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "052FEBF8-B775-4D8E-B958-A6A17E4DFA23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9747F834-034D-438B-8BE5-5B2BDD8FFA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF142C-42C7-4BD0-9C30-C3B044F6BA3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "72362874-2BF7-48D4-9C3E-1DC151AA118B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2974B301-5F64-453C-A2A6-E231A998F9E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3BCD5-7472-45A2-8F62-834A90941EC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB81C8F-46C1-4A87-B5B5-E63AE9654399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "079634DC-D13E-41A3-87E0-F694C3315647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36912424-2973-4550-9EFD-FC344EC55933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A653F-768A-4981-9FEC-AC31395BA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E5412D-27CB-4755-BF7F-0DAC3BEC5575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1568AF81-D676-448F-A64D-561E8F7DD874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849."
},
{
"lang": "es",
"value": "Cisco TelePresence TC Software 4.x y 5.x y TE Software 4.x y 6.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de paquetes H.225 manipulados, tambi\u00e9n conocido como Bug ID CSCtq78849."
}
],
"id": "CVE-2014-2175",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-02T10:55:08.430",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-2174 (GCVE-0-2014-2174)
Vulnerability from cvelistv5 – Published: 2015-05-25 00:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.904Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-05-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-25T00:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2174",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2174",
"datePublished": "2015-05-25T00:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.904Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0722 (GCVE-0-2015-0722)
Vulnerability from cvelistv5 – Published: 2015-05-25 00:00 – Updated: 2024-08-06 04:17
VLAI?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:17:32.824Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-05-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-25T00:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0722",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2015-0722",
"datePublished": "2015-05-25T00:00:00",
"dateReserved": "2015-01-07T00:00:00",
"dateUpdated": "2024-08-06T04:17:32.824Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2170 (GCVE-0-2014-2170)
Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.897Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2170",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2170",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.897Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2164 (GCVE-0-2014-2164)
Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2164",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2164",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.723Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2171 (GCVE-0-2014-2171)
Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.949Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2171",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2171",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.949Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2165 (GCVE-0-2014-2165)
Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.881Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2165",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2165",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.881Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2167 (GCVE-0-2014-2167)
Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:06:00.211Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2167",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2167",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:06:00.211Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2173 (GCVE-0-2014-2173)
Vulnerability from cvelistv5 – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:06:00.183Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2173",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2173",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:06:00.183Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2174 (GCVE-0-2014-2174)
Vulnerability from nvd – Published: 2015-05-25 00:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.904Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-05-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-25T00:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2174",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2174",
"datePublished": "2015-05-25T00:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.904Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0722 (GCVE-0-2015-0722)
Vulnerability from nvd – Published: 2015-05-25 00:00 – Updated: 2024-08-06 04:17
VLAI?
Summary
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:17:32.824Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-05-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-25T00:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0722",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20150513 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2015-0722",
"datePublished": "2015-05-25T00:00:00",
"dateReserved": "2015-01-07T00:00:00",
"dateUpdated": "2024-08-06T04:17:32.824Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2170 (GCVE-0-2014-2170)
Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.897Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2170",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Software 4.x and 6.0 allow remote authenticated users to execute arbitrary commands by using the commands as arguments to tshell (aka tcsh) scripts, aka Bug ID CSCue60202."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2170",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.897Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2164 (GCVE-0-2014-2164)
Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2164",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCuj94651."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2164",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.723Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2171 (GCVE-0-2014-2171)
Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.949Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2171",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1 and TE Software 4.x and 6.0.x before 6.0.2 allows remote attackers to execute arbitrary code via crafted SIP packets, aka Bug ID CSCud81796."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2171",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.949Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2165 (GCVE-0-2014-2165)
Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:05
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:05:59.881Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2165",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtq72699."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2165",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:05:59.881Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2167 (GCVE-0-2014-2167)
Vulnerability from nvd – Published: 2014-05-02 10:00 – Updated: 2024-08-06 10:06
VLAI?
Summary
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:06:00.211Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-02T04:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2167",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140430 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-tcte"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-2167",
"datePublished": "2014-05-02T10:00:00",
"dateReserved": "2014-02-25T00:00:00",
"dateUpdated": "2024-08-06T10:06:00.211Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}