Executive Summary
Summary | |
---|---|
Title | Multiple Vulnerabilities in Cisco TelePresence TC and TE Software |
Informations | |||
---|---|---|---|
Name | cisco-sa-20150513-tc | First vendor Publication | 2015-05-13 |
Vendor | Cisco | Last vendor Modification | 2015-05-13 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.3 | Attack Range | Adjacent network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco TelePresence TC and TE Software contains the following vulnerabilities: Cisco TelePresence TC and TE Software Authentication Bypass Vulnerability Cisco TelePresence TC and TE Software Crafted Packets Denial of Service Vulnerability Successful exploitation of the Cisco TelePresence TC and TE Software Authentication Bypass Vulnerability could allow an attacker to bypass system authentication and access the device with the privileges of the root user. Successful exploitation of the Cisco TelePresence TC and TE Software Crafted Packets Denial of Service Vulnerability could allow an attacker to restart several processes and possibly trigger a reload of the affected system. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc BEGIN PGP SIGNATURE Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJVU3QrAAoJEIpI1I6i1Mx3KgEQAMHnrs6JZaOpnP8+6Wxju5OR 0ulIgyk2RYW4SBLtJSkFhuDREVyVXzLgtxHAvIO0cyr3NVYFlEAb/yGsII3uSCg4 jVzJNibh+2yifMudBCkMjZ3+izI58n2vyiuxPHmNXb1n7HmhyP/ncNRcHhJ0A4I/ qJepCahXxBArhSGFU+rT/SVpgmWv7y02uo4YdveBWx6M7njgG8a7sgv9jJpwkgFf nMmoHPFkUhLLGYL+Kx0dTsn4hh6aXbcBDUfPfed0I1p4umB35ObGFkA/C6Tqjws/ QAyy3gSeZ7Q6rbnpLj+u2Rw1YeugaITEo9SSsQipGgaHBgGbnfYW/a0h3eFvCmFM IZP70cvWPBvRfoNY4jffPxvwnNfFMv9P/z8qRskTnCeiz1xRl8A5xbsAVW3LIPap 67/qk00CVb+N03ZjQIzgX7MsHVaR5rFi9oKdCeLf7f34yaKmE6vkA3XIt41L8rYl GetG/l+M0O5tJXR5cof3IQCZEtm7PWFQ/y6u/iFmriQbj9tJj64aJCMuD+x9cbP3 55XkoI5uxzkinSUxLc/pHRmeAA1R30RXbnCbx+e2bQFpazPLqOQpTM8lQMTm9HNe MLaascX60VF06UjPBl/aD/Xd8CvB8PvIPIw1XjekMmgG6Ppq3aNj71hQrAUTS8Re zUnuMVeWE7YRYsndKY4m =CfBI END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-399 | Resource Management Errors |
50 % | CWE-284 | Access Control (Authorization) Issues |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-05-21 | IAVM : 2015-A-0117 - Multiple Vulnerabilities in Cisco Telepresence Products Severity : Category I - VMSKEY : V0060745 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco TelePresence TC and TE software authentication bypass attempt RuleID : 45730 - Revision : 1 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote device is missing a vendor-supplied security patch. File : cisco_telepresence_sa_20150513_tc.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-12-05 21:23:46 |
|
2015-05-26 21:30:11 |
|
2015-05-21 13:29:10 |
|
2015-05-13 21:25:56 |
|