cve-2023-20008
Vulnerability from cvelistv5
Published
2023-01-19 01:41
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.
This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-roomos-dkjGFgRK", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "RoomOS 10.3.2.0" }, { "status": "affected", "version": "RoomOS 10.3.4.0" }, { "status": "affected", "version": "RoomOS 10.8.2.5" }, { "status": "affected", "version": "RoomOS 10.11.5.2" }, { "status": "affected", "version": "RoomOS 10.8.4.0" }, { "status": "affected", "version": "RoomOS 10.11.3.0" }, { "status": "affected", "version": "RoomOS 10.15.3.0" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "TC7.3.21" }, { "status": "affected", "version": "RoomOS 10.8.4.0" }, { "status": "affected", "version": "RoomOS 10.11.3.0" }, { "status": "affected", "version": "RoomOS 10.11.5.2" }, { "status": "affected", "version": "RoomOS 10.15.3.0" }, { "status": "affected", "version": "9.15.3.25" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\r\n\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:30.027Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-dkjGFgRK", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK" } ], "source": { "advisory": "cisco-sa-roomos-dkjGFgRK", "defects": [ "CSCwc47201" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20008", "datePublished": "2023-01-19T01:41:03.629Z", "dateReserved": "2022-10-27T18:47:50.307Z", "dateUpdated": "2024-08-02T08:57:35.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-20008\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2023-01-20T07:15:13.057\",\"lastModified\":\"2024-01-25T17:15:24.283\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device.\\r\\n\\r This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la CLI de Cisco TelePresence CE y el software RoomOS podr\u00eda permitir que un atacante local autenticado sobrescriba archivos arbitrarios en el sistema local de un dispositivo afectado. Esta vulnerabilidad se debe a controles de acceso inadecuados a archivos que se encuentran en el sistema de archivos local. Un atacante podr\u00eda aprovechar esta vulnerabilidad colocando un enlace simb\u00f3lico en una ubicaci\u00f3n espec\u00edfica del sistema de archivos local de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante sobrescribir archivos arbitrarios en el dispositivo afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D83C41B-DD92-4B31-B2B3-BD831B908E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83093692-59FB-4C24-AF96-A76DFADD37C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3E919D-0686-4680-882C-7EB636EC1089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.8.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA427278-651C-47AB-996E-3B0BD307E34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.11.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"293FE8EE-2C4E-4EA2-BBC7-680C08F45E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.11.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A27105-A41F-4814-BCA9-2DE3D1505D73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:roomos:10.15.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB29E8E8-74BD-430E-A12E-E91E27FF81A2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B79B19D-B749-4353-B366-3C6B5171AA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7846817-340F-49CF-AA2E-ACBE2BCC854C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BA8275-E3B9-4901-A4AF-F3CB713C6740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9840947F-758C-4A97-B9D2-A9F1B414D6FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDF1A6F-9CDD-41E6-835A-41B06A9078EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A50221CF-D98B-44CC-B60F-7C095D29F844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0783DDF5-520C-470C-ACA1-A2E6871E2F14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDF553F-4945-43EB-9D87-2AD8464EE7BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE000291-6A76-40D1-A4AA-DEC5DD995F92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B11A1A-6EB5-4234-82D9-DCBD7E21EAD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB53A45A-2B87-4104-85D5-96EFD4EBAF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C672A9A-3AD3-44B3-B8BE-1EA3A5AE9D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:8.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2B1C53-EAB4-44D7-80B1-EBF564DEF664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E22AE6C0-3FDE-435E-BA25-2664A2B9758C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2E8E40-3B18-49A6-B78C-472B5D55039D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67604778-41A3-4519-B526-4807EBD8E61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F781A5E-C38E-4BE3-9F47-8B0392E6DEF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479C49D0-5279-4054-8440-9683624AC057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42E4172-2723-426D-AE73-453C74961885\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4770CB-A207-4D72-9EC0-2B6AEE9EC54E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F248A6D4-23C6-4D6D-B972-D6F9E711B61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0559D1BB-51A9-4285-A845-ECB6A6B7D678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1ED50F6-B01C-4003-A797-109DA9A631FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3C7127-EE08-4212-92DF-C8D568F2A453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F86038-E6D2-4F6F-B768-68525833FD8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C931235-9560-4186-A339-167DAB5B7E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABCAF219-6E5E-42BB-9892-B17D99634518\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA1A42D-D874-4DD4-BB08-AFFEE4EAD015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1785B2F-B319-403F-A106-9137B9D140BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73AE384-CF1A-4D57-8E95-4E2D5DFB1E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB34F64-D33A-4C32-9D18-5CAF45CB1933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C05E7CB-5ABF-4F61-B6B8-03F46B91FBF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906C8212-DD6A-4485-8629-EBEFC727C70D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758679DD-D282-4FDC-9D46-BF698660C789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6F63CDD-D2B6-4FED-9C93-63AD60882EAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A529A0C7-CCE3-4994-B412-0BEC7B4D2E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5CFE99-B3DB-429E-AEBA-3F863E29EDF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AEF4D9-06A3-4A15-B310-F3F2896B0992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659220C8-4391-40C9-8047-8F761ECC58C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A16E86-C21B-42B6-88A9-AF3CF0957C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43DC02FB-1308-4505-BB12-BDBA971B48E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF3A23C7-7BB6-4A18-AFCF-47F508FA3561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3800DAF9-E42F-474C-8C9C-F8A5934148D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"310C0A56-6523-42EB-8BF2-4C13969D057E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E93335-92B5-4EEC-8D79-952463ECBB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F349CFD5-D70F-426C-B670-156FD558E50F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FE1690-CA64-4D12-8538-5FC0727ED553\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_tc:7.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05922155-725D-4695-B7BF-3BEA4A0D418B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_tc:7.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8692F9C-D9C1-412A-8CA0-04DA37509819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_tc:7.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E73BF2C9-F26F-471C-A566-8EE06FECBB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_tc:7.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"604336DF-DDE2-4250-8CA4-3800EB9F935A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_tc:7.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191F7E36-58D5-411F-8D45-C4F225A35B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:telepresence_tc:7.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1436BE5E-2EC2-4FDF-BDAE-AF590D36C838\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.