Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-0713 | First vendor Publication | 2015-05-24 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software before 4.4(3.54) and 4.5 before 4.5(1.45), Cisco TelePresence MSE Supervisor Software before 2.3(1.38), Cisco TelePresence Serial Gateway Series Software before 1.0(1.42), Cisco TelePresence Server Software for Hardware before 3.1(1.98), and Cisco TelePresence Server Software for Virtual Machine before 4.1(1.79) allows remote authenticated users to execute arbitrary commands with root privileges via unspecified vectors, aka Bug IDs CSCul55968, CSCur08993, CSCur15803, CSCur15807, CSCur15825, CSCur15832, CSCur15842, CSCur15850, and CSCur15855. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0713 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-05-21 | IAVM : 2015-A-0117 - Multiple Vulnerabilities in Cisco Telepresence Products Severity : Category I - VMSKEY : V0060745 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco TelePresence command injection attempt RuleID : 47681 - Revision : 1 - Type : SERVER-WEBAPP |
2020-12-05 | Cisco TelePresence command injection attempt RuleID : 47680 - Revision : 1 - Type : SERVER-WEBAPP |
2020-12-05 | Cisco TelePresence command injection attempt RuleID : 47679 - Revision : 1 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-21 | Name : The remote device is affected by a command injection vulnerability. File : cisco-sa-20150513-tp-isdngw.nasl - Type : ACT_GATHER_INFO |
2015-05-21 | Name : The remote device is affected by a command injection vulnerability. File : cisco_telepresence_ip_vcr_sa_20150513_tp.nasl - Type : ACT_GATHER_INFO |
2015-05-21 | Name : The remote device is affected by a command injection vulnerability. File : cisco_telepresence_mcu_sa_20150513_tp.nasl - Type : ACT_GATHER_INFO |
2015-05-21 | Name : The remote device is affected by a command injection vulnerability. File : cisco_telepresence_mse_sa-20150513-tp.nasl - Type : ACT_GATHER_INFO |
2015-05-21 | Name : The remote host is affected by command injection vulnerability. File : cisco_telepresence_server_sa_20150513_tp.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:44:56 |
|
2021-05-04 12:36:25 |
|
2021-04-22 01:44:08 |
|
2020-12-05 21:23:46 |
|
2020-05-23 00:43:39 |
|
2016-04-27 01:44:39 |
|
2015-10-18 17:23:23 |
|
2015-05-29 05:25:42 |
|
2015-05-28 05:26:56 |
|
2015-05-26 21:26:55 |
|
2015-05-25 09:26:36 |
|