Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-0653 | First vendor Publication | 2015-03-12 |
Vendor | Cve | Last vendor Modification | 2019-06-11 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The management interface in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway before X7.2.4, X8 before X8.1.2, and X8.2 before X8.2.2 and Cisco TelePresence Conductor before X2.3.1 and XC2.4 before XC2.4.1 allows remote attackers to bypass authentication via crafted login parameters, aka Bug IDs CSCur02680 and CSCur05556. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0653 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-287 | Improper Authentication |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-03-19 | IAVM : 2015-A-0058 - Multiple Vulnerabilities in Cisco TelePresence Video Communication Server (VCS) Severity : Category I - VMSKEY : V0059297 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-17 | Cisco TelePresence Video Communication Server authentication bypass attempt RuleID : 33871 - Revision : 2 - Type : SERVER-WEBAPP |
2015-03-17 | Cisco TelePresence Video Communication Server SDP media description denial of... RuleID : 33870 - Revision : 1 - Type : PROTOCOL-VOIP |
2015-03-17 | Cisco TelePresence Video Communication Server SDP media description denial of... RuleID : 33869 - Revision : 1 - Type : PROTOCOL-VOIP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-20 | Name : The remote host is affected by a security bypass vulnerability. File : cisco_telepresence_conductor_sa_CSCur05556.nasl - Type : ACT_GATHER_INFO |
2015-03-20 | Name : The remote host is affected by a security bypass vulnerability. File : cisco_telepresence_vcs_sa_CSCur02680.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote host is affected by a denial of service vulnerability. File : cisco_telepresence_conductor_sa_CSCun73192.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote host is affected by a denial of service vulnerability. File : cisco_telepresence_vcs_sa_CSCus96593.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
CISCO | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa... |
SECTRACK | http://www.securitytracker.com/id/1031910 |
Alert History
Date | Informations |
---|---|
2021-05-05 01:16:50 |
|
2021-05-04 12:36:24 |
|
2021-04-22 01:44:08 |
|
2020-05-23 01:54:26 |
|
2020-05-23 00:43:38 |
|
2019-06-12 00:18:53 |
|
2018-10-12 12:03:30 |
|
2017-11-07 12:05:25 |
|
2016-04-27 01:44:16 |
|
2015-10-18 17:23:21 |
|
2015-09-11 21:24:57 |
|
2015-03-21 13:27:42 |
|
2015-03-18 09:28:56 |
|
2015-03-17 21:26:23 |
|
2015-03-14 00:22:58 |
|
2015-03-13 09:23:43 |
|