CVE-2011-0388 (GCVE-0-2011-0388)

Vulnerability from cvelistv5 – Published: 2011-02-25 11:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.cisco.com/en/US/products/products_secu… vendor-advisoryx_refsource_CISCO
http://www.securitytracker.com/id?1025114 vdb-entryx_refsource_SECTRACK
http://www.cisco.com/en/US/products/products_secu… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/46523 vdb-entryx_refsource_BID
http://www.securitytracker.com/id?1025113 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.555Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
          },
          {
            "name": "1025114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025114"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "46523",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46523"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-11T10:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
        },
        {
          "name": "1025114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025114"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "46523",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46523"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0388",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
            },
            {
              "name": "1025114",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025114"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "46523",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46523"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0388",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.555Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F357829D-FEBE-498A-AD14-680411A7C522\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45E2377D-690A-474E-843A-697DA2BDE7B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61F55EB7-FF5A-418C-B7B2-F44C5920E266\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73576525-5C00-4D19-8670-F4D8B841A57B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B862A01F-71E8-412F-AF83-3A64FB7352EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"909CA78F-933F-4C79-8F91-D6B17FCD7093\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C885CA7-3DCC-4C05-8945-FBF2CD08EACA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D000335-5F60-49A8-B642-A5BEDC6A6820\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1B8EF29-8A24-47C7-8108-07B27AF0FDC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D99CDCC2-5373-447E-9AB2-DEDB5C6327D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"606E06B8-B00B-4EE1-A763-A62C9105C5E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CECA0482-FD41-46E7-A8F9-54BC665A83FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E431D427-EA04-4296-BB23-D638ADA1FF8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B70A01B1-CE17-47BF-9035-7168DF790125\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0A9D905-3740-4B9D-A26C-DFA6CBD2D154\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69F84CF3-ED9D-4962-8930-ACB5319AFF6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"260AD1B1-D5F3-433D-8B82-DF17197031C4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DC3BECB-61EE-4668-B139-D46BCF5E0F69\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.\"}, {\"lang\": \"es\", \"value\": \"Dispositivos TelePresence Recording Server con software v1.6.x y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x y v1.6.x, no restrige correctamente el acceso remoto a la interfaz servlet de Java RMI, permitiendo a atacantes remotos provocar una denegaci\\u00f3n de servicio (agotamiento de memoria y corte Web) a trav\\u00e9s de m\\u00faltiples peticiones manipuladas, tambi\\u00e9n conocido como error ID CSCtg35830 y CSCtg35825.\"}]",
      "id": "CVE-2011-0388",
      "lastModified": "2024-11-21T01:23:51.907",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2011-02-25T12:00:18.900",
      "references": "[{\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46523\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id?1025113\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id?1025114\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46523\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025113\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025114\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-0388\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2011-02-25T12:00:18.900\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.\"},{\"lang\":\"es\",\"value\":\"Dispositivos TelePresence Recording Server con software v1.6.x y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x y v1.6.x, no restrige correctamente el acceso remoto a la interfaz servlet de Java RMI, permitiendo a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de memoria y corte Web) a trav\u00e9s de m\u00faltiples peticiones manipuladas, tambi\u00e9n conocido como error ID CSCtg35830 y CSCtg35825.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F357829D-FEBE-498A-AD14-680411A7C522\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E2377D-690A-474E-843A-697DA2BDE7B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F55EB7-FF5A-418C-B7B2-F44C5920E266\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73576525-5C00-4D19-8670-F4D8B841A57B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B862A01F-71E8-412F-AF83-3A64FB7352EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909CA78F-933F-4C79-8F91-D6B17FCD7093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C885CA7-3DCC-4C05-8945-FBF2CD08EACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D000335-5F60-49A8-B642-A5BEDC6A6820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B8EF29-8A24-47C7-8108-07B27AF0FDC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99CDCC2-5373-447E-9AB2-DEDB5C6327D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"606E06B8-B00B-4EE1-A763-A62C9105C5E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECA0482-FD41-46E7-A8F9-54BC665A83FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E431D427-EA04-4296-BB23-D638ADA1FF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70A01B1-CE17-47BF-9035-7168DF790125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A9D905-3740-4B9D-A26C-DFA6CBD2D154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F84CF3-ED9D-4962-8930-ACB5319AFF6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260AD1B1-D5F3-433D-8B82-DF17197031C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC3BECB-61EE-4668-B139-D46BCF5E0F69\"}]}]}],\"references\":[{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46523\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id?1025113\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id?1025114\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46523\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025114\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…