This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2016-07-15
Product Meeting Server Last view 2023-11-01
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:meeting_server:2.0.0:*:*:*:*:*:*:* 17
cpe:2.3:a:cisco:meeting_server:1.8_base:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:meeting_server:2.0.1:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:meeting_server:2.0.4:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:meeting_server:2.0.3:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:meeting_server:2.0.5:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:meeting_server:2.1.0:*:*:*:*:*:*:* 14
cpe:2.3:a:cisco:meeting_server:1.9.0:*:*:*:*:*:*:* 14
cpe:2.3:a:cisco:meeting_server:1.9.2:*:*:*:*:*:*:* 13
cpe:2.3:a:cisco:meeting_server:1.8.15:*:*:*:*:*:*:* 13
cpe:2.3:a:cisco:meeting_server:2.2.0:*:*:*:*:*:*:* 12
cpe:2.3:a:cisco:meeting_server:2.0:*:*:*:*:*:*:* 12
cpe:2.3:a:cisco:meeting_server:*:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.0.6:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.0.9:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.0.7:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.0.8:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.1.1:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.2.5:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.1.4:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.2:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:-:*:*:*:*:*:*:* 11
cpe:2.3:a:cisco:meeting_server:2.0.12:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.0.13:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.0.10:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.0.11:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.0.14:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.0.15:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.0.2:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:1.9:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:1.9_base:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.5:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:1.7_base:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.3.0:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.10:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.9:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.3:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.8:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.7:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.6:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.2:*:*:*:*:*:*:* 10
cpe:2.3:a:cisco:meeting_server:2.1.11:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:meeting_server:2.3:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:meeting_server:2.0.16:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:meeting_server:2.2.1:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:meeting_server:2.2.2:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:meeting_server:2.2.4:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:meeting_server:2.2.3:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:meeting_server:2.2.8:*:*:*:*:*:*:* 8

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2023-11-01 CVE-2023-20255

A vulnerability in an API of the Web Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause a partial availability condition, which could cause ongoing video calls to be dropped due to the invalid packets reaching the Web Bridge.

7.5 2021-10-21 CVE-2021-40122

A vulnerability in an API of the Call Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper handling of large series of message requests. An attacker could exploit this vulnerability by sending a series of messages to the vulnerable API. A successful exploit could allow the attacker to cause the affected device to reload, dropping all ongoing calls and resulting in a DoS condition.

6.5 2021-06-16 CVE-2021-1524

A vulnerability in the API of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because requests that are sent to the API are not properly validated. An attacker could exploit this vulnerability by sending a malicious request to the API. A successful exploit could allow the attacker to cause all participants on a call to be disconnected, resulting in a DoS condition.

5.3 2020-07-16 CVE-2020-3197

A vulnerability in the API subsystem of Cisco Meetings App could allow an unauthenticated, remote attacker to retain and reuse the Traversal Using Relay NAT (TURN) server credentials that are configured in an affected system. The vulnerability is due to insufficient protection mechanisms for the TURN server credentials. An attacker could exploit this vulnerability by intercepting the legitimate traffic that is generated by an affected system. An exploit could allow the attacker to obtain the TURN server credentials, which the attacker could use to place audio/video calls and forward packets through the configured TURN server. The attacker would not be able to take control of the TURN server unless the same credentials were used in multiple systems.

5.3 2020-02-19 CVE-2020-3160

A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) feature of Cisco Meeting Server software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition for users of XMPP conferencing applications. Other applications and processes are unaffected. The vulnerability is due to improper input validation of XMPP packets. An attacker could exploit this vulnerability by sending crafted XMPP packets to an affected device. An exploit could allow the attacker to cause process crashes and a DoS condition for XMPP conferencing applications.

6.7 2019-06-19 CVE-2019-1623

A vulnerability in the CLI configuration shell of Cisco Meeting Server could allow an authenticated, local attacker to inject arbitrary commands as the root user. The vulnerability is due to insufficient input validation during the execution of a vulnerable CLI command. An attacker with administrator-level credentials could exploit this vulnerability by injecting crafted arguments during command execution. A successful exploit could allow the attacker to perform arbitrary code execution as root on an affected product.

5.1 2019-04-17 CVE-2019-1794

A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.

7.5 2019-02-08 CVE-2019-1676

A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected.

4.3 2019-02-07 CVE-2019-1678

A vulnerability in Cisco Meeting Server could allow an authenticated, remote attacker to cause a partial denial of service (DoS) to Cisco Meetings application users who are paired with a Session Initiation Protocol (SIP) endpoint. The vulnerability is due to improper validation of coSpaces configuration parameters. An attacker could exploit this vulnerability by inserting crafted strings in specific coSpace parameters. An exploit could allow the attacker to prevent clients from joining a conference call in the affected coSpace. Versions prior to 2.4.3 are affected.

7.5 2018-11-08 CVE-2018-15446

A vulnerability in Cisco Meeting Server could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper protections on data that is returned from user meeting requests when the Guest access via ID and passcode option is set to Legacy mode. An attacker could exploit this vulnerability by sending meeting requests to an affected system. A successful exploit could allow the attacker to determine the values of meeting room unique identifiers, possibly allowing the attacker to conduct further exploits.

8.8 2018-10-05 CVE-2018-0439

A vulnerability in the web-based management interface of Cisco Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. A successful exploit could allow the attacker to perform arbitrary actions on an affected device by using a web browser and with the privileges of the user.

6.5 2018-06-21 CVE-2018-0371

A vulnerability in the Web Admin Interface of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of incoming HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the Web Admin Interface of an affected Cisco Meeting Server. A successful exploit could allow the attacker to restart the system, terminating all ongoing calls and resulting in a DoS condition on the affected product. This vulnerability affects the following releases of Cisco Meeting Server: Acano X-Series, Cisco Meeting Server 1000, Cisco Meeting Server 2000. Cisco Bug IDs: CSCvi48624.

5.5 2018-06-21 CVE-2018-0359

A vulnerability in the session identification management functionality of the web-based management interface for Cisco Meeting Server could allow an unauthenticated, local attacker to hijack a valid user session identifier, aka Session Fixation. The vulnerability exists because the affected application does not assign a new session identifier to a user session when a user authenticates to the application. An attacker could exploit this vulnerability by using a hijacked session identifier to connect to the application through the web-based management interface. A successful exploit could allow the attacker to hijack an authenticated user's browser session. Cisco Bug IDs: CSCvi23787.

7.4 2018-06-07 CVE-2018-0263

A vulnerability in Cisco Meeting Server (CMS) could allow an unauthenticated, adjacent attacker to access services running on internal device interfaces of an affected system. The vulnerability is due to incorrect default configuration of the device, which can expose internal interfaces and ports on the external interface of the system. A successful exploit could allow the attacker to gain unauthenticated access to configuration and database files and sensitive meeting information on an affected system. This vulnerability affects Cisco Meeting Server (CMS) 2000 Platforms that are running a CMS Software release prior to Release 2.2.13 or Release 2.3.4. Cisco Bug IDs: CSCvg76471.

7.5 2018-05-16 CVE-2018-0280

A vulnerability in the Real-Time Transport Protocol (RTP) bitstream processing of the Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of incoming RTP bitstreams. An attacker could exploit this vulnerability by sending a crafted RTP bitstream to an affected Cisco Meeting Server. A successful exploit could allow the attacker to deny audio and video services by causing media process crashes resulting in a DoS condition on the affected product. This vulnerability affects Cisco Meeting Server deployments that are running Cisco Meeting Server Software Releases 2.0, 2.1, 2.2, and 2.3. Cisco Bug IDs: CSCve79693, CSCvf91393, CSCvg64656, CSCvh30725, CSCvi86363.

8.1 2018-05-02 CVE-2018-0262

A vulnerability in Cisco Meeting Server could allow an unauthenticated, remote attacker to gain unauthorized access to components of, or sensitive information in, an affected system, leading to Remote Code Execution. The vulnerability is due to incorrect default configuration of the device, which can expose internal interfaces and ports on the external interface of the system. A successful exploit could allow the attacker to gain unauthenticated access to configuration and database files as well as sensitive meeting information on an affected system. Additionally, if the Traversal Using Relay NAT (TURN) service is enabled and utilizing Transport Layer Security (TLS) connections, an attacker could utilize TURN credentials to forward traffic to device daemons, allowing for remote exploitation. This vulnerability affects Cisco Meeting Server (CMS) Acano X-series platforms that are running a CMS Software release prior to 2.2.11. Cisco Bug IDs: CSCvg76469.

6.5 2017-11-30 CVE-2017-12362

A vulnerability in Cisco Meeting Server versions prior to 2.2.2 could allow an authenticated, remote attacker to cause the system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to video calls being made on systems with a particular configuration. An attacker could exploit this by knowing a valid URI that directs to a Cisco Meeting Server. An attacker could then make a video call and cause the system to reload. Cisco Bug IDs: CSCve65931.

5.8 2017-11-16 CVE-2017-12311

A vulnerability in the H.264 decoder function of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a Cisco Meeting Server media process to restart unexpectedly when it receives an illegal H.264 frame. The vulnerability is triggered by an H.264 frame that has an invalid picture parameter set (PPS) value. An attacker could exploit this vulnerability by sending a malformed H.264 frame to the targeted device. An exploit could allow the attacker to cause a denial of service (DoS) condition because the media process could restart. The media session should be re-established within a few seconds, during which there could be a brief interruption in service. Cisco Bug IDs: CSCvg12559.

5.3 2017-10-05 CVE-2017-12264

A vulnerability in the Web Admin Interface of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient bound checks performed by the affected software. An attacker could exploit this vulnerability by sending a malicious HTTP packet to the affected system. A successful exploit could allow the attacker to cause a reload of the Web Admin Server. Cisco Bug IDs: CSCve89149.

9.1 2017-09-13 CVE-2017-12249

A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127.

6.7 2017-09-07 CVE-2017-6794

A vulnerability in the CLI command-parsing code of Cisco Meeting Server could allow an authenticated, local attacker to perform command injection and escalate their privileges to root. The attacker must first authenticate to the application with valid administrator credentials. The vulnerability is due to insufficient validation of user-supplied input at the CLI for certain commands. An attacker could exploit this vulnerability by authenticating to the affected application and submitting a crafted CLI command for execution at the Cisco Meeting Server CLI. An exploit could allow the attacker to perform command injection and escalate their privilege level to root. Vulnerable Products: This vulnerability exists in Cisco Meeting Server software versions prior to and including 2.0, 2.1, and 2.2. Cisco Bug IDs: CSCvf53830.

6.5 2017-09-07 CVE-2017-12224

A vulnerability in the ability for guest users to join meetings via a hyperlink with Cisco Meeting Server could allow an authenticated, remote attacker to enter a meeting with a hyperlink URL, even though access should be denied. The vulnerability is due to the incorrect implementation of the configuration setting Guest access via hyperlinks, which should allow the administrative user to prevent guest users from using hyperlinks to connect to meetings. An attacker could exploit this vulnerability by using a crafted hyperlink to connect to a meeting. An exploit could allow the attacker to connect directly to the meeting with a hyperlink, even though access should be denied. The attacker would still require a valid hyperlink and encoded secret identifier to be connected. Cisco Bug IDs: CSCve20873.

7.5 2017-08-07 CVE-2017-6763

A vulnerability in the implementation of the H.264 protocol in Cisco Meeting Server (CMS) 2.1.4 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected application does not properly validate Fragmentation Unit (FU-A) protocol packets. An attacker could exploit this vulnerability by sending a crafted H.264 FU-A packet through the affected application. A successful exploit could allow the attacker to cause a DoS condition on the affected system due to an unexpected restart of the CMS media process on the system. Although the CMS platform continues to operate and only the single, affected CMS media process is restarted, a brief interruption of media traffic for certain users could occur. Cisco Bug IDs: CSCve10131.

8.1 2017-02-21 CVE-2017-3837

An HTTP Packet Processing vulnerability in the Web Bridge interface of the Cisco Meeting Server (CMS), formerly Acano Conferencing Server, could allow an authenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. In addition, the attacker could potentially cause the application to crash unexpectedly, resulting in a denial of service (DoS) condition. The attacker would need to be authenticated and have a valid session with the Web Bridge. Affected Products: This vulnerability affects Cisco Meeting Server software releases prior to 2.1.2. This product was previously known as Acano Conferencing Server. More Information: CSCvc89551. Known Affected Releases: 2.0 2.0.7 2.1. Known Fixed Releases: 2.1.2.

7.5 2017-02-21 CVE-2017-3830

A vulnerability in an internal API of the Cisco Meeting Server (CMS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected appliance. More Information: CSCvc89678. Known Affected Releases: 2.1. Known Fixed Releases: 2.1.2.

CWE : Common Weakness Enumeration

%idName
46% (13) CWE-20 Improper Input Validation
10% (3) CWE-200 Information Exposure
7% (2) CWE-352 Cross-Site Request Forgery (CSRF)
7% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (1) CWE-668 Exposure of Resource to Wrong Sphere
3% (1) CWE-427 Uncontrolled Search Path Element
3% (1) CWE-404 Improper Resource Shutdown or Release
3% (1) CWE-384 Session Fixation
3% (1) CWE-287 Improper Authentication
3% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
3% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
3% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...

Snort® IPS/IDS

Date Description
2020-12-05 Cisco Meeting Server user configuration download attempt
RuleID : 46750 - Type : SERVER-OTHER - Revision : 2
2020-12-05 Cisco Meeting Server configuration download attempt
RuleID : 46749 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Docker API ContainerCreate request detected
RuleID : 46500 - Type : POLICY-OTHER - Revision : 1
2016-11-03 Cisco Meeting Server SIP SDP media description buffer overflow attempt
RuleID : 40638 - Type : PROTOCOL-VOIP - Revision : 1