var-201304-0287
Vulnerability from variot
The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. Vendors have confirmed this vulnerability Bug ID CSCuc11328 ,and CSCub05448 It is released as.By a third party (1) SIP Session, or (2) H.323 Cleverly crafted in session RTP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence is a set of video conferencing solutions called "Telepresence" systems from Cisco (USA). This solution provides components such as audio and video space, which can provide remote participants with a "face-to-face" virtual conference room effect. A denial of service vulnerability exists in several Cisco TelePresence products. An attacker could use this vulnerability to reload the device and deny legitimate users. The vulnerability exists in the following products: Cisco TelePresence MCU, Cisco TelePresence Server. The vulnerability originates from the program H.264 data is not properly validated
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "telepresence server software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.1\\(1.37\\)" }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(1.59\\)" }, { "model": "telepresence server software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.1\\(1.33\\)" }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.2\\(1.43\\)" }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.2\\(1.46\\)" }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(1.51\\)" }, { "model": "telepresence mcu 4500 series software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(1.51\\)" }, { "model": "telepresence server software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "2.2\\(1.43\\)" }, { "model": "telepresence mcu 4500 series software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "4.3\\(2.18\\)" }, { "model": "telepresence mcu 4505", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4520", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4515", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4500 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.43\\)" }, { "model": "telepresence mcu 4501 series software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "4.3\\(2.18\\)" }, { "model": "telepresence mcu 4501 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3\\(1.68\\)" }, { "model": "telepresence server 7010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3\\(1.68\\)" }, { "model": "telepresence mcu mse series software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "4.3\\(2.18\\)" }, { "model": "telepresence mcu 4501 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.43\\)" }, { "model": "telepresence mcu 4500 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.46\\)" }, { "model": "telepresence mcu mse 8510", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4500 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.50\\)" }, { "model": "telepresence mcu 4501 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.46\\)" }, { "model": "telepresence server software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.2\\(1.54\\)" }, { "model": "telepresence mcu 4501 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.50\\)" }, { "model": "telepresence mcu 4500 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(1.59\\)" }, { "model": "telepresence mcu 4501", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4501 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(1.51\\)" }, { "model": "telepresence server mse 8710", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4501 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(1.59\\)" }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1.50\\)" }, { "model": "telepresence mcu 4510", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4500 series software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3\\(1.68\\)" }, { "model": "telepresence mcu 4500 series software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "4.3(2.30)" }, { "model": "telepresence mcu 4501", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4501 series software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "4.3(2.30)" }, { "model": "telepresence mcu 4505", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4510", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4515", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence mcu 4520", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence mcu mse 8510", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence mcu mse series software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "4.3(2.30)" }, { "model": "telepresence server 7010", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence server mse 8710", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence server software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "2.3(1.55)" }, { "model": "telepresence server software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.2\\(1.54\\)" }, { "model": "telepresence mcu mse series software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.3\\(2.18\\)" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "CNNVD", "id": "CNNVD-201304-418" }, { "db": "NVD", "id": "CVE-2013-1176" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:telepresence_mcu_4500_series_software", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_mcu_4501", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:telepresence_mcu_4501_series_software", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_mcu_4505", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_mcu_4510", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_mcu_4515", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_mcu_4520", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_mcu_mse_8510", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:telepresence_mcu_mse_series_software", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_server_7010", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_server_mse_8710", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:telepresence_server_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002413" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "59272" }, { "db": "CNNVD", "id": "CNNVD-201304-397" } ], "trust": 0.9 }, "cve": "CVE-2013-1176", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2013-1176", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-61178", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-1176", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-1176", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201304-418", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-61178", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-61178" }, { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "CNNVD", "id": "CNNVD-201304-418" }, { "db": "NVD", "id": "CVE-2013-1176" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. Vendors have confirmed this vulnerability Bug ID CSCuc11328 ,and CSCub05448 It is released as.By a third party (1) SIP Session, or (2) H.323 Cleverly crafted in session RTP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence is a set of video conferencing solutions called \"Telepresence\" systems from Cisco (USA). This solution provides components such as audio and video space, which can provide remote participants with a \"face-to-face\" virtual conference room effect. \nA denial of service vulnerability exists in several Cisco TelePresence products. An attacker could use this vulnerability to reload the device and deny legitimate users. The vulnerability exists in the following products: Cisco TelePresence MCU, Cisco TelePresence Server. The vulnerability originates from the program H.264 data is not properly validated", "sources": [ { "db": "NVD", "id": "CVE-2013-1176" }, { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "CNNVD", "id": "CNNVD-201304-397" }, { "db": "BID", "id": "59272" }, { "db": "VULHUB", "id": "VHN-61178" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-1176", "trust": 2.8 }, { "db": "BID", "id": "59272", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-002413", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201304-418", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201304-397", "trust": 0.6 }, { "db": "SECUNIA", "id": "53129", "trust": 0.6 }, { "db": "CISCO", "id": "20130417 CISCO TELEPRESENCE INFRASTRUCTURE DENIAL OF SERVICE VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-61178", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61178" }, { "db": "BID", "id": "59272" }, { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "CNNVD", "id": "CNNVD-201304-397" }, { "db": "CNNVD", "id": "CNNVD-201304-418" }, { "db": "NVD", "id": "CVE-2013-1176" } ] }, "id": "VAR-201304-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-61178" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:35:24.273000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130417-tpi", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi" }, { "title": "28929", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=28929" }, { "title": "cisco-sa-20130417-tpi", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/111/1117/1117760_cisco-sa-20130417-tpi-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002413" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61178" }, { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "NVD", "id": "CVE-2013-1176" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130417-tpi" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1176" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1176" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/59272" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53129" }, { "trust": 0.3, "url": "http://www.cisco.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-61178" }, { "db": "BID", "id": "59272" }, { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "CNNVD", "id": "CNNVD-201304-397" }, { "db": "CNNVD", "id": "CNNVD-201304-418" }, { "db": "NVD", "id": "CVE-2013-1176" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-61178" }, { "db": "BID", "id": "59272" }, { "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "db": "CNNVD", "id": "CNNVD-201304-397" }, { "db": "CNNVD", "id": "CNNVD-201304-418" }, { "db": "NVD", "id": "CVE-2013-1176" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-18T00:00:00", "db": "VULHUB", "id": "VHN-61178" }, { "date": "2013-04-17T00:00:00", "db": "BID", "id": "59272" }, { "date": "2013-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "date": "2013-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-397" }, { "date": "2013-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-418" }, { "date": "2013-04-18T18:55:03.970000", "db": "NVD", "id": "CVE-2013-1176" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-19T00:00:00", "db": "VULHUB", "id": "VHN-61178" }, { "date": "2013-04-22T12:50:00", "db": "BID", "id": "59272" }, { "date": "2013-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002413" }, { "date": "2013-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-397" }, { "date": "2013-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-418" }, { "date": "2024-11-21T01:49:03.067000", "db": "NVD", "id": "CVE-2013-1176" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-397" }, { "db": "CNNVD", "id": "CNNVD-201304-418" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Cisco TelePresence Product denial of service vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-397" }, { "db": "CNNVD", "id": "CNNVD-201304-418" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-418" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.