Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-0652 | First vendor Publication | 2015-03-12 |
Vendor | Cve | Last vendor Modification | 2015-09-11 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Session Description Protocol (SDP) implementation in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway before X8.2 and Cisco TelePresence Conductor before XC2.4 allows remote attackers to cause a denial of service (mishandled exception and device reload) via a crafted media description, aka Bug IDs CSCus96593 and CSCun73192. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0652 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-03-19 | IAVM : 2015-A-0058 - Multiple Vulnerabilities in Cisco TelePresence Video Communication Server (VCS) Severity : Category I - VMSKEY : V0059297 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-17 | Cisco TelePresence Video Communication Server authentication bypass attempt RuleID : 33871 - Revision : 2 - Type : SERVER-WEBAPP |
2015-03-17 | Cisco TelePresence Video Communication Server SDP media description denial of... RuleID : 33870 - Revision : 1 - Type : PROTOCOL-VOIP |
2015-03-17 | Cisco TelePresence Video Communication Server SDP media description denial of... RuleID : 33869 - Revision : 1 - Type : PROTOCOL-VOIP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-20 | Name : The remote host is affected by a security bypass vulnerability. File : cisco_telepresence_conductor_sa_CSCur05556.nasl - Type : ACT_GATHER_INFO |
2015-03-20 | Name : The remote host is affected by a security bypass vulnerability. File : cisco_telepresence_vcs_sa_CSCur02680.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote host is affected by a denial of service vulnerability. File : cisco_telepresence_conductor_sa_CSCun73192.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote host is affected by a denial of service vulnerability. File : cisco_telepresence_vcs_sa_CSCus96593.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
CISCO | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa... |
SECTRACK | http://www.securitytracker.com/id/1031910 |
Alert History
Date | Informations |
---|---|
2021-05-05 01:16:50 |
|
2021-05-04 12:36:24 |
|
2021-04-22 01:44:08 |
|
2020-05-23 01:54:26 |
|
2020-05-23 00:43:38 |
|
2018-10-12 12:03:30 |
|
2017-11-07 12:05:25 |
|
2016-04-27 01:44:15 |
|
2015-10-18 17:23:20 |
|
2015-09-11 21:24:57 |
|
2015-03-20 13:29:01 |
|
2015-03-18 09:28:56 |
|
2015-03-17 21:26:23 |
|
2015-03-14 00:22:58 |
|
2015-03-13 09:23:42 |
|