Executive Summary

Summary
Title Multiple Vulnerabilities in Cisco TelePresence TC and TE Software
Informations
Name cisco-sa-20150513-tc First vendor Publication 2015-05-13
Vendor Cisco Last vendor Modification 2015-05-13
Severity (Vendor) N/A Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 8.3 Attack Range Adjacent network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cisco TelePresence TC and TE Software contains the following vulnerabilities:

Cisco TelePresence TC and TE Software Authentication Bypass Vulnerability Cisco TelePresence TC and TE Software Crafted Packets Denial of Service Vulnerability

Successful exploitation of the Cisco TelePresence TC and TE Software Authentication Bypass Vulnerability could allow an attacker to bypass system authentication and access the device with the privileges of the root user.

Successful exploitation of the Cisco TelePresence TC and TE Software Crafted Packets Denial of Service Vulnerability could allow an attacker to restart several processes and possibly trigger a reload of the affected system.

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc

BEGIN PGP SIGNATURE Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - https://gpgtools.org

iQIcBAEBCgAGBQJVU3QrAAoJEIpI1I6i1Mx3KgEQAMHnrs6JZaOpnP8+6Wxju5OR 0ulIgyk2RYW4SBLtJSkFhuDREVyVXzLgtxHAvIO0cyr3NVYFlEAb/yGsII3uSCg4 jVzJNibh+2yifMudBCkMjZ3+izI58n2vyiuxPHmNXb1n7HmhyP/ncNRcHhJ0A4I/ qJepCahXxBArhSGFU+rT/SVpgmWv7y02uo4YdveBWx6M7njgG8a7sgv9jJpwkgFf nMmoHPFkUhLLGYL+Kx0dTsn4hh6aXbcBDUfPfed0I1p4umB35ObGFkA/C6Tqjws/ QAyy3gSeZ7Q6rbnpLj+u2Rw1YeugaITEo9SSsQipGgaHBgGbnfYW/a0h3eFvCmFM IZP70cvWPBvRfoNY4jffPxvwnNfFMv9P/z8qRskTnCeiz1xRl8A5xbsAVW3LIPap 67/qk00CVb+N03ZjQIzgX7MsHVaR5rFi9oKdCeLf7f34yaKmE6vkA3XIt41L8rYl GetG/l+M0O5tJXR5cof3IQCZEtm7PWFQ/y6u/iFmriQbj9tJj64aJCMuD+x9cbP3 55XkoI5uxzkinSUxLc/pHRmeAA1R30RXbnCbx+e2bQFpazPLqOQpTM8lQMTm9HNe MLaascX60VF06UjPBl/aD/Xd8CvB8PvIPIw1XjekMmgG6Ppq3aNj71hQrAUTS8Re zUnuMVeWE7YRYsndKY4m =CfBI END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-284 Access Control (Authorization) Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 56
Application 4

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-05-21 IAVM : 2015-A-0117 - Multiple Vulnerabilities in Cisco Telepresence Products
Severity : Category I - VMSKEY : V0060745

Snort® IPS/IDS

Date Description
2020-12-05 Cisco TelePresence TC and TE software authentication bypass attempt
RuleID : 45730 - Revision : 1 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2015-05-20 Name : The remote device is missing a vendor-supplied security patch.
File : cisco_telepresence_sa_20150513_tc.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2020-12-05 21:23:46
  • Multiple Updates
2015-05-26 21:30:11
  • Multiple Updates
2015-05-21 13:29:10
  • Multiple Updates
2015-05-13 21:25:56
  • First insertion