// For flags

CVE-2020-3336

Cisco TelePresence Collaboration Endpoint and RoomOS Software Command Injection Vulnerability

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS.

Una vulnerabilidad en el proceso de actualización de software de Cisco TelePresence Collaboration Endpoint Software y Cisco RoomOS Software, podría permitir a un atacante remoto autenticado modificar el sistema de archivos para causar una denegación de servicio (DoS) u conseguir acceso privilegiado al sistema de archivos root. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante con privilegios administrativos podría explotar esta vulnerabilidad mediante el envío de peticiones con parámetros malformados al sistema utilizando la consola, Secure Shell (SSH) o API web. Una explotación con éxito podría permitir a un atacante modificar la configuración del dispositivo o causar una DoS

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-06-18 CVE Published
  • 2024-07-27 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Roomos
Search vendor "Cisco" for product "Roomos"
--
Affected
Cisco
Search vendor "Cisco"
Telepresence Collaboration Endpoint
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint"
< 9.9.4
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint" and version " < 9.9.4"
-
Affected
Cisco
Search vendor "Cisco"
Telepresence Collaboration Endpoint
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint"
>= 9.10.0 <= 9.10.2
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint" and version " >= 9.10.0 <= 9.10.2"
-
Affected
Cisco
Search vendor "Cisco"
Telepresence Collaboration Endpoint
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint"
>= 9.12.0 <= 9.12.3
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint" and version " >= 9.12.0 <= 9.12.3"
-
Affected