VAR-201308-0221
Vulnerability from variot - Updated: 2023-12-18 13:53Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128. Vendors report this vulnerability Bug ID CSCui43128 Published as.By a third party, HTTPS Via request, settings may be changed or arbitrary actions may be taken. Cisco TelePresence System Software is prone to an unauthorized-access vulnerability Attackers can exploit this issue to gain unauthorized administrative access to affected system. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCui43128. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The solution provides components such as audio and video spaces, which can provide remote participants with a "face-to-face" virtual meeting room effect. A remote attacker can exploit this vulnerability to modify the configuration or perform arbitrary operations through HTTPS requests
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201308-0221",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.3\\(4042\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.3"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.4\\(4072\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.5"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.4"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.5\\(4097\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.6\\(4109\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.2"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.6"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.6.2\\(4023\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.0.1\\(3\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.4\\(270\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.3"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.0.1\\(4\\)"
},
{
"model": "telepresence system 3210",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system 1300",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.4"
},
{
"model": "telepresence system tx9200",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.8\\(4222\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.6\\(4\\)"
},
{
"model": "telepresence system 3200",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.0\\(3954\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.3\\(2115\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.10.0"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.2.1\\(2\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.1"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.3.2\\(1393\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.7\\(2229\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.10"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.1\\(68\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.2\\(28\\)"
},
{
"model": "telepresence system tx9000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.1\\(4864\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.3\\(4\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.6"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.13"
},
{
"model": "telepresence system 1300-65",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.11"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.1\\(50\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.2.3"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.12"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.0.2\\(4719\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.5"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.1\\(2082\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.4.7"
},
{
"model": "telepresence system software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "1.10.1"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.2.3\\(1101\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.0\\(46\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.13\\(3717\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.3.2"
},
{
"model": "telepresence system 3010",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.2\\(4937\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.0"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.7\\(4212\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.2"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.5\\(42\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.12\\(3701\\)"
},
{
"model": "telepresence system 3000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.10\\(3648\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.0.1\\(4764\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.0\\(55\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.2\\(11\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.1\\(34\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.1"
},
{
"model": "telepresence system 500-37",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.5.11\\(3659\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.3"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.7"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.6.8"
},
{
"model": "telepresence system 500-32",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 1300 series",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 1300-65",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3010",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3200",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3210",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 500-32",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 500-37",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1.8.1 to 1.10.1 (500-37"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1300"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1x00"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3x00"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "30x0 series )"
},
{
"model": "telepresence system software",
"scope": "lte",
"trust": 0.8,
"vendor": "cisco",
"version": "6.0.3 (500-32"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "tx1310"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "tx9x00 series )"
},
{
"model": "telepresence system tx1310",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system tx9000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system tx9200",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0.3\\(33\\)",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.10.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0.1\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3454"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "61659"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
],
"trust": 0.9
},
"cve": "CVE-2013-3454",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-3454",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-63456",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-3454",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201308-126",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-63456",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63456"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128. Vendors report this vulnerability Bug ID CSCui43128 Published as.By a third party, HTTPS Via request, settings may be changed or arbitrary actions may be taken. Cisco TelePresence System Software is prone to an unauthorized-access vulnerability\nAttackers can exploit this issue to gain unauthorized administrative access to affected system. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCui43128. Cisco TelePresence is a set of video conferencing solutions called \"TelePresence\" system of Cisco (Cisco). The solution provides components such as audio and video spaces, which can provide remote participants with a \"face-to-face\" virtual meeting room effect. A remote attacker can exploit this vulnerability to modify the configuration or perform arbitrary operations through HTTPS requests",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "BID",
"id": "61659"
},
{
"db": "VULHUB",
"id": "VHN-63456"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-3454",
"trust": 2.8
},
{
"db": "BID",
"id": "61659",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20130807 CISCO TELEPRESENCE SYSTEM DEFAULT CREDENTIALS VULNERABILITY",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-63456",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63456"
},
{
"db": "BID",
"id": "61659"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"id": "VAR-201308-0221",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-63456"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:53:28.843000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20130807-tp",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130807-tp"
},
{
"title": "30323",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30323"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63456"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "NVD",
"id": "CVE-2013-3454"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130807-tp"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3454"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3454"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/61659"
},
{
"trust": 0.3,
"url": "http://www.cisco.com"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/ps7060/index.html"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63456"
},
{
"db": "BID",
"id": "61659"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-63456"
},
{
"db": "BID",
"id": "61659"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-08T00:00:00",
"db": "VULHUB",
"id": "VHN-63456"
},
{
"date": "2013-08-07T00:00:00",
"db": "BID",
"id": "61659"
},
{
"date": "2013-08-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"date": "2013-08-08T14:55:08.717000",
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"date": "2013-08-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-09T00:00:00",
"db": "VULHUB",
"id": "VHN-63456"
},
{
"date": "2013-08-07T00:00:00",
"db": "BID",
"id": "61659"
},
{
"date": "2013-08-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003680"
},
{
"date": "2013-08-09T17:55:27.520000",
"db": "NVD",
"id": "CVE-2013-3454"
},
{
"date": "2013-08-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Cisco TelePresence System Runs on device Cisco TelePresence System Software Vulnerable to change settings",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003680"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-126"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.