Vulnerabilites related to cisco - telepresence_e20_software
Vulnerability from fkie_nvd
Published
2012-01-19 15:55
Modified
2024-11-21 01:32
Severity ?
Summary
Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_e20_software | * | |
cisco | telepresence_e20_software | te2.2 | |
cisco | telepresence_e20_software | te2.2.1 | |
cisco | telepresence_e20_software | te4.0.0 | |
cisco | telepresence_e20_software | te4.1.0 | |
cisco | telepresence_e20_software | te4.1.1 | |
cisco | telepresence_e20_software | tenc4.0.0 | |
cisco | telepresence_e20_software | tenc4.1.0 | |
cisco | telepresence_e20_software | tenc4.1.1 | |
cisco | telepresence_e20_software | tenc4.1.1-cucm | |
cisco | ip_video_phone_e20 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F283D9C2-6417-4164-ABCF-92CDCEE0369F", "versionEndIncluding": "te4.1.1-cucm", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F1FA842-B89F-4297-8C32-E07E8DD64A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F1890CD-A9DE-426A-9769-BD69D38C38AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "71BC3E49-C15E-4658-BC03-F0AC5913B4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A0F3990-2C2F-4CF7-9F8B-2F799A89FA2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2AC50D6-6989-4E1D-A5EF-BA8BCC90F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D31C6E3-3D59-4980-B1C9-1F8F625CF1D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B75F0545-9A8D-4199-9BD0-CC4FA590DD8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6D61CB9-78CE-4FB7-BBC8-F94E4D59BB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "75788217-A69B-4F08-B16C-A2A8BE9FD32A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555." }, { "lang": "es", "value": "Cisco TelePresence Software antes de TE v4.1.1 en el Cisco IP Video Phone E20 tiene una contrase\u00f1a por defecto para la cuenta de root tras una actualizaci\u00f3n a la v4.1.0 TE, lo cual permite modificar la configuraci\u00f3n a trav\u00e9s de una sesi\u00f3n SSH a atacantes remotos. Se trata de un problema tambi\u00e9n conocido como Bug ID CSCtw69889 y es diferente al CVE-2011-2555." } ], "id": "CVE-2011-4659", "lastModified": "2024-11-21T01:32:43.777", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-19T15:55:00.820", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-31 23:55
Modified
2024-11-21 01:28
Severity ?
Summary
Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_codec_c40 | * | |
cisco | telepresence_codec_c60 | * | |
cisco | telepresence_codec_c90 | * | |
cisco | telepresence_ex60 | * | |
cisco | telepresence_ex90 | * | |
cisco | telepresence_c_series_software | * | |
cisco | telepresence_c_series_software | tc3.0.0 | |
cisco | telepresence_c_series_software | tc3.1.0 | |
cisco | telepresence_c_series_software | tc3.1.1 | |
cisco | telepresence_c_series_software | tc3.1.2 | |
cisco | telepresence_c_series_software | tc3.1.3 | |
cisco | telepresence_6000_mxp | * | |
cisco | telepresence_9000_mxp | * | |
cisco | telepresence_mxp_software | f8.2 | |
cisco | telepresence_mxp_software | f9.0 | |
cisco | telepresence_mxp_software | f9.0.1 | |
cisco | telepresence_mxp_software | f9.0.2 | |
cisco | telepresence_e20 | * | |
cisco | telepresence_e20_software | te2.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5E2223-2180-4D0F-9E34-8AF54DC97FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:*:*:*:*:*:*:*:*", "matchCriteriaId": "001596FF-7961-4983-8E1B-E272C94958EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC21F7C-240C-446E-BDF6-3E1AB9B05B4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex60:*:*:*:*:*:*:*:*", "matchCriteriaId": "6817FE7D-7326-48A4-B0D4-82D086A59789", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex90:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE5666DD-9D12-4B3F-8E36-E86A74FD63CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A0C0F89-EB02-44F7-8C5B-5F1BB6F7B78E", "versionEndIncluding": "tc3.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "50105F72-7662-4501-A636-12B0CA39F3AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDC54B18-A85D-4E7D-92EA-E41B7BBFE674", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE78B49E-437A-4152-A900-A4970820B651", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "60241812-BAAA-4B09-8081-0E56E3F17D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "AEB09627-26D5-44AE-9A25-3B6FF42DB4BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_6000_mxp:*:*:*:*:*:*:*:*", "matchCriteriaId": "059AF6E3-0E8A-4C80-85D2-92E4F6C1148F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_9000_mxp:*:*:*:*:*:*:*:*", "matchCriteriaId": "33339F8B-49B8-4601-974B-25954B13DFD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f8.2:*:*:*:*:*:*:*", "matchCriteriaId": "5DE1AE6C-A4A2-4B30-908C-B762C7FF3731", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C323D0-15A4-4639-9DDC-513BD7EEC5E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B30A62F0-46F1-4F5E-9359-034609462F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E634F54-2913-4BAD-A6C6-93A0043A6253", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_e20:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C4723AA-DB31-4528-9B0E-DA89A0A48EEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F1890CD-A9DE-426A-9769-BD69D38C38AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en TelePresence C Series Endpoints de Cisco, unidades E/EX Personal Video, y MXP Series Codecs, cuando se utilizan las versiones de software anterior a versiones 4.0.0 o F9.1 del TC, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de un paquete SIP dise\u00f1ado al puerto 5060 o 5061, tambi\u00e9n se conoce como Bug ID CSCtq46500." } ], "id": "CVE-2011-2577", "lastModified": "2024-11-21T01:28:31.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-31T23:55:03.300", "references": [ { "source": "psirt@cisco.com", "url": "http://securityreason.com/securityalert/8387" }, { "source": "psirt@cisco.com", "url": "http://securityreason.com/securityalert/8389" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml" }, { "source": "psirt@cisco.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/17871" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/49392" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id?1025994" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/17871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-4659
Vulnerability from cvelistv5
Published
2012-01-19 15:00
Modified
2024-09-17 03:42
Severity ?
EPSS score ?
Summary
Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:19.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120118 Cisco IP Video Phone E20 Default Root Account", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T15:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120118 Cisco IP Video Phone E20 Default Root Account", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-4659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120118 Cisco IP Video Phone E20 Default Root Account", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-4659", "datePublished": "2012-01-19T15:00:00Z", "dateReserved": "2011-12-01T00:00:00Z", "dateUpdated": "2024-09-17T03:42:52.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2577
Vulnerability from cvelistv5
Published
2011-08-31 23:00
Modified
2024-08-06 23:08
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025994 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/8389 | third-party-advisory, x_refsource_SREASON | |
http://securityreason.com/securityalert/8387 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/49392 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/69513 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/519698/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.exploit-db.com/exploits/17871 | exploit, x_refsource_EXPLOIT-DB | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:08:23.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025994", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025994" }, { "name": "8389", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8389" }, { "name": "8387", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8387" }, { "name": "49392", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49392" }, { "name": "cisco-telepresence-codecs-sip-dos(69513)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513" }, { "name": "20110919 Cisco TelePresence Multiple Vulnerabilities - SOS-11-010", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded" }, { "name": "17871", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/17871" }, { "name": "20110831 Denial of Service Vulnerability in Cisco TelePresence Codecs", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025994", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025994" }, { "name": "8389", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8389" }, { "name": "8387", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8387" }, { "name": "49392", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49392" }, { "name": "cisco-telepresence-codecs-sip-dos(69513)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513" }, { "name": "20110919 Cisco TelePresence Multiple Vulnerabilities - SOS-11-010", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded" }, { "name": "17871", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/17871" }, { "name": "20110831 Denial of Service Vulnerability in Cisco TelePresence Codecs", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-2577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025994", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025994" }, { "name": "8389", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8389" }, { "name": "8387", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8387" }, { "name": "49392", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49392" }, { "name": "cisco-telepresence-codecs-sip-dos(69513)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513" }, { "name": "20110919 Cisco TelePresence Multiple Vulnerabilities - SOS-11-010", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded" }, { "name": "17871", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/17871" }, { "name": "20110831 Denial of Service Vulnerability in Cisco TelePresence Codecs", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-2577", "datePublished": "2011-08-31T23:00:00", "dateReserved": "2011-06-27T00:00:00", "dateUpdated": "2024-08-06T23:08:23.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }