6 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 67EXPL: 0

A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. • http://www.securityfocus.com/bid/98934 http://www.securitytracker.com/id/1038624 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 14EXPL: 0

CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341. Vulnerabilidad de inyección CRLF en Cisco TelePresence TC 6.x anterior a 6.3.4 y 7.x anterior a 7.3.3 en los dispositivos Integrator C SX20 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y realizar ataques de la división de respuestas HTTP a través de una URL manipulada, también conocido como Bug ID CSCut79341. • http://tools.cisco.com/security/center/viewAlert.x?alertId=39210 http://www.securitytracker.com/id/1032511 • CWE-20: Improper Input Validation CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') •

CVSS: 8.3EPSS: 0%CPEs: 44EXPL: 0

Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651. Cisco TelePresence T, TelePresence TE, y TelePresence TC anterior a 7.1 no implementan correctamente el control de acceso, lo que permite a atacantes remotos obtener privilegios root mediante el envío de paquetes en la red local y permite a atacantes físicamente próximos obtener privilegios root a través de vectores no especificados, también conocido como Bug ID CSCub67651. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc • CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952. Los controladores de red en Cisco TelePresence T, Cisco TelePresence TE, y Cisco TelePresence TC anterior a 7.3.2 permiten a atacantes remotos causar una denegación de servicio (reinicio de proceso o recarga de dispositivo) a través de una inundación de paquetes IP manipulados, también conocido como Bug ID CSCuj68952. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc • CWE-399: Resource Management Errors •

CVSS: 5.8EPSS: 0%CPEs: 15EXPL: 0

Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980. Vulnerabilidad de la redirección abierta en la página de login en Cisco TC Software anterior a 6.3-26 y 7.x anterior a 7.3.0 en dispositivos Cisco TelePresence Collaboration Desk and Room Endpoints permite a atacantes remotos redirigir usuarios hacia sitios web arbitrarios y llevar a cabo ataques de phishing a través de vectores no especificados, también conocido como Bug ID CSCuq94980. • http://tools.cisco.com/security/center/viewAlert.x?alertId=38350 http://www.securitytracker.com/id/1032136 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •