VAR-201401-0325
Vulnerability from variot - Updated: 2023-12-18 12:08The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796. Cisco TelePresence System is prone to an arbitrary command-execution vulnerability. Remote attackers can exploit this issue to execute arbitrary calls through stack corruption with the privilege of the root user. This issue being tracked by Cisco Bug ID CSCui32796. The solution provides components such as audio and video space, which can provide remote participants with a face-to-face virtual meeting room effect. The following versions are affected: Cisco TelePresence System 500-37, 1000, 1300-65, 3xxx prior to 1.10.2(42), 500-32, 1300-47, TX1310 65, TX9xxx prior to 6.0.4(11)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201401-0325",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0.0.1\\(4\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.10.0"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0.2\\(28\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0.1\\(50\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.10.0\\(259\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.1.0\\(90\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.5.10\\(3648\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.10.1"
},
{
"model": "telepresence system 3210",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system 3200",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system tx9200",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.6\\(4\\)"
},
{
"model": "telepresence system 1000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.5\\(4\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.4\\(13\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.4\\(19\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.3\\(4\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.6.1\\(3\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.1\\(68\\)"
},
{
"model": "telepresence system tx9000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0.3\\(33\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.5\\(7\\)"
},
{
"model": "telepresence system 1300-65",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 1100",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.2\\(19\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.6\\(2\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.0\\(46\\)"
},
{
"model": "telepresence system software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "1.10.1\\(43\\)"
},
{
"model": "telepresence system 3010",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.9.3\\(44\\)"
},
{
"model": "telepresence system tx1310 65",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.7.5\\(42\\)"
},
{
"model": "telepresence system 3000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.0\\(55\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.2\\(11\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.8.1\\(34\\)"
},
{
"model": "telepresence system 500-37",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system tx1300 47",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "telepresence system 500-32",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 1000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 1100",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 1300-65",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3010",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3200",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 3210",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 500-32",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system 500-37",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "1.10.2(42) (500-37"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1000"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1300-65"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3000"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3010"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3200"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3210)"
},
{
"model": "telepresence system software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "6.0.4(11) (500-32"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1300-47"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "tx1310 65"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "tx9000"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "tx9200)"
},
{
"model": "telepresence system tx1300 47",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system tx1310 65",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system tx9000",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system tx9200",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "1.10.1\\(43\\)"
},
{
"model": "telepresence system software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "6.0.3\\(33\\)"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.10.1\\(43\\)",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0.3\\(33\\)",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0661"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "65071"
}
],
"trust": 0.3
},
"cve": "CVE-2014-0661",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 8.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2014-0661",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"id": "VHN-68154",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-0661",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201401-427",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-68154",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68154"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796. Cisco TelePresence System is prone to an arbitrary command-execution vulnerability. \nRemote attackers can exploit this issue to execute arbitrary calls through stack corruption with the privilege of the root user. \nThis issue being tracked by Cisco Bug ID CSCui32796. The solution provides components such as audio and video space, which can provide remote participants with a face-to-face virtual meeting room effect. The following versions are affected: Cisco TelePresence System 500-37, 1000, 1300-65, 3xxx prior to 1.10.2(42), 500-32, 1300-47, TX1310 65, TX9xxx prior to 6.0.4(11) ",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "BID",
"id": "65071"
},
{
"db": "VULHUB",
"id": "VHN-68154"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-0661",
"trust": 2.8
},
{
"db": "BID",
"id": "65071",
"trust": 1.4
},
{
"db": "SECUNIA",
"id": "56533",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1029656",
"trust": 1.1
},
{
"db": "OSVDB",
"id": "102362",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20140122 CISCO TELEPRESENCE SYSTEM SOFTWARE COMMAND EXECUTION VULNERABILITY",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-68154",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68154"
},
{
"db": "BID",
"id": "65071"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"id": "VAR-201401-0325",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-68154"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:08:53.863000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20130807-tp",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130807-tp"
},
{
"title": "30323",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30323"
},
{
"title": "cisco-sa-20140122-cts",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/112/1121/1121768_cisco-sa-20140122-cts-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-94",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68154"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "NVD",
"id": "CVE-2014-0661"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140122-cts"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/65071"
},
{
"trust": 1.1,
"url": "http://osvdb.org/102362"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1029656"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/56533"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0661"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0661"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68154"
},
{
"db": "BID",
"id": "65071"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-68154"
},
{
"db": "BID",
"id": "65071"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-01-22T00:00:00",
"db": "VULHUB",
"id": "VHN-68154"
},
{
"date": "2014-01-22T00:00:00",
"db": "BID",
"id": "65071"
},
{
"date": "2014-01-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"date": "2014-01-22T21:55:03.560000",
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"date": "2014-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-68154"
},
{
"date": "2014-01-28T00:33:00",
"db": "BID",
"id": "65071"
},
{
"date": "2014-01-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001231"
},
{
"date": "2017-08-29T01:34:14.250000",
"db": "NVD",
"id": "CVE-2014-0661"
},
{
"date": "2014-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco TelePresence System Arbitrary Command Execution Vulnerability",
"sources": [
{
"db": "BID",
"id": "65071"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201401-427"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.