// For flags

CVE-2021-1532

Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, remote attacker to read arbitrary files from the underlying operating system. This vulnerability is due to insufficient path validation of command arguments. An attacker could exploit this vulnerability by sending a crafted command request to the xAPI. A successful exploit could allow the attacker to read the contents of any file that is located on the device filesystem.

Una vulnerabilidad en la API de endpoint de video (xAPI) de Cisco TelePresence Collaboration Endpoint (CE) Software y Cisco RoomOS Software, podría permitir a un atacante remoto autenticado leer archivos arbitrarios del sistema operativo subyacente. Esta vulnerabilidad es debido a una comprobación insuficiente de la ruta de los argumentos de los comandos. Un atacante podría explotar esta vulnerabilidad mediante el envío una petición de comando diseñada a la xAPI. Una explotación con éxito podría permitir al atacante leer el contenido de cualquier archivo que se encuentre en el sistema de archivos del dispositivo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-05-06 CVE Published
  • 2023-04-21 EPSS Updated
  • 2024-11-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Telepresence Collaboration Endpoint
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint"
< 9.14.6
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint" and version " < 9.14.6"
-
Affected
Cisco
Search vendor "Cisco"
Telepresence Collaboration Endpoint
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint"
>= 9.15.0.11 < 9.15.3
Search vendor "Cisco" for product "Telepresence Collaboration Endpoint" and version " >= 9.15.0.11 < 9.15.3"
-
Affected
Cisco
Search vendor "Cisco"
Roomos
Search vendor "Cisco" for product "Roomos"
< 10.3.1
Search vendor "Cisco" for product "Roomos" and version " < 10.3.1"
-
Affected