Executive Summary

Informations
Name CVE-2015-0713 First vendor Publication 2015-05-24
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software before 4.4(3.54) and 4.5 before 4.5(1.45), Cisco TelePresence MSE Supervisor Software before 2.3(1.38), Cisco TelePresence Serial Gateway Series Software before 1.0(1.42), Cisco TelePresence Server Software for Hardware before 3.1(1.98), and Cisco TelePresence Server Software for Virtual Machine before 4.1(1.79) allows remote authenticated users to execute arbitrary commands with root privileges via unspecified vectors, aka Bug IDs CSCul55968, CSCur08993, CSCur15803, CSCur15807, CSCur15825, CSCur15832, CSCur15842, CSCur15850, and CSCur15855.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0713

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 3
Application 1
Application 1
Application 2
Application 5
Application 11
Application 3
Application 10
Application 3

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-05-21 IAVM : 2015-A-0117 - Multiple Vulnerabilities in Cisco Telepresence Products
Severity : Category I - VMSKEY : V0060745

Snort® IPS/IDS

Date Description
2020-12-05 Cisco TelePresence command injection attempt
RuleID : 47681 - Revision : 1 - Type : SERVER-WEBAPP
2020-12-05 Cisco TelePresence command injection attempt
RuleID : 47680 - Revision : 1 - Type : SERVER-WEBAPP
2020-12-05 Cisco TelePresence command injection attempt
RuleID : 47679 - Revision : 1 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2015-05-21 Name : The remote device is affected by a command injection vulnerability.
File : cisco-sa-20150513-tp-isdngw.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote device is affected by a command injection vulnerability.
File : cisco_telepresence_ip_vcr_sa_20150513_tp.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote device is affected by a command injection vulnerability.
File : cisco_telepresence_mcu_sa_20150513_tp.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote device is affected by a command injection vulnerability.
File : cisco_telepresence_mse_sa-20150513-tp.nasl - Type : ACT_GATHER_INFO
2015-05-21 Name : The remote host is affected by command injection vulnerability.
File : cisco_telepresence_server_sa_20150513_tp.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2024-11-28 12:44:56
  • Multiple Updates
2021-05-04 12:36:25
  • Multiple Updates
2021-04-22 01:44:08
  • Multiple Updates
2020-12-05 21:23:46
  • Multiple Updates
2020-05-23 00:43:39
  • Multiple Updates
2016-04-27 01:44:39
  • Multiple Updates
2015-10-18 17:23:23
  • Multiple Updates
2015-05-29 05:25:42
  • Multiple Updates
2015-05-28 05:26:56
  • Multiple Updates
2015-05-26 21:26:55
  • Multiple Updates
2015-05-25 09:26:36
  • First insertion