var-201308-0221
Vulnerability from variot
Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128. Vendors report this vulnerability Bug ID CSCui43128 Published as.By a third party, HTTPS Via request, settings may be changed or arbitrary actions may be taken. Cisco TelePresence System Software is prone to an unauthorized-access vulnerability Attackers can exploit this issue to gain unauthorized administrative access to affected system. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCui43128. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The solution provides components such as audio and video spaces, which can provide remote participants with a "face-to-face" virtual meeting room effect. A remote attacker can exploit this vulnerability to modify the configuration or perform arbitrary operations through HTTPS requests
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0221", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.6" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.5" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.3\\(4042\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.6\\(4109\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.3" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.2" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.5\\(4097\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.2\\(4023\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.4\\(4072\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.6.4" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.3" }, { "model": "telepresence system 3210", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system 1300-65", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.1" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.0\\(46\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.3\\(1101\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.13" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.2\\(11\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.5" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.0.2\\(4719\\)" }, { "model": "telepresence system 3200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.3\\(2115\\)" }, { "model": "telepresence system tx9200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.1" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.5\\(42\\)" }, { "model": "telepresence system 500-37", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.6\\(4\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.8\\(4222\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.10\\(3648\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.0.1\\(3\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.7\\(4212\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.7\\(2229\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.0\\(3954\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.4" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.0.1\\(4764\\)" }, { "model": "telepresence system 3000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.1\\(4864\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.0.1\\(4\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.10" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.0" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.3" }, { "model": "telepresence system software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.10.1" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.10.0" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.2" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.7" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.0\\(55\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.11\\(3659\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.12" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.2" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.2\\(4937\\)" }, { "model": "telepresence system 500-32", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.8" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.2\\(28\\)" }, { "model": "telepresence system tx9000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.3" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.4\\(270\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.1\\(2082\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.1\\(68\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.12\\(3701\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.6.7" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.2.1\\(2\\)" }, { "model": "telepresence system 3010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.11" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.5.13\\(3717\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.3\\(4\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0.1\\(50\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.6" }, { "model": "telepresence system 1300", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.1\\(34\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.2\\(1393\\)" }, { "model": "telepresence system 1300 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 1300-65", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3010", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3200", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3210", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 500-32", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 500-37", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.8.1 to 1.10.1 (500-37" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1300" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1x00" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3x00" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "30x0 series )" }, { "model": "telepresence system software", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "6.0.3 (500-32" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "tx1310" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "tx9x00 series )" }, { "model": "telepresence system tx1310", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system tx9000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system tx9200", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "CNNVD", "id": "CNNVD-201308-126" }, { "db": "NVD", "id": "CVE-2013-3454" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:telepresence_system_1300_series", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_1300-65", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_3000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_3010", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_3200", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_3210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_500-32", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_500-37", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:telepresence_system_software", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_tx1310", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_tx9000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:telepresence_system_tx9200", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003680" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "61659" }, { "db": "CNNVD", "id": "CNNVD-201308-126" } ], "trust": 0.9 }, "cve": "CVE-2013-3454", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2013-3454", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-63456", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3454", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3454", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201308-126", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-63456", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-63456" }, { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "CNNVD", "id": "CNNVD-201308-126" }, { "db": "NVD", "id": "CVE-2013-3454" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128. Vendors report this vulnerability Bug ID CSCui43128 Published as.By a third party, HTTPS Via request, settings may be changed or arbitrary actions may be taken. Cisco TelePresence System Software is prone to an unauthorized-access vulnerability\nAttackers can exploit this issue to gain unauthorized administrative access to affected system. This may aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCui43128. Cisco TelePresence is a set of video conferencing solutions called \"TelePresence\" system of Cisco (Cisco). The solution provides components such as audio and video spaces, which can provide remote participants with a \"face-to-face\" virtual meeting room effect. A remote attacker can exploit this vulnerability to modify the configuration or perform arbitrary operations through HTTPS requests", "sources": [ { "db": "NVD", "id": "CVE-2013-3454" }, { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "BID", "id": "61659" }, { "db": "VULHUB", "id": "VHN-63456" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3454", "trust": 2.8 }, { "db": "BID", "id": "61659", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-003680", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201308-126", "trust": 0.7 }, { "db": "CISCO", "id": "20130807 CISCO TELEPRESENCE SYSTEM DEFAULT CREDENTIALS VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63456", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63456" }, { "db": "BID", "id": "61659" }, { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "CNNVD", "id": "CNNVD-201308-126" }, { "db": "NVD", "id": "CVE-2013-3454" } ] }, "id": "VAR-201308-0221", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63456" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:48:23.062000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130807-tp", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130807-tp" }, { "title": "30323", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30323" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003680" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63456" }, { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "NVD", "id": "CVE-2013-3454" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130807-tp" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3454" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3454" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61659" }, { "trust": 0.3, "url": "http://www.cisco.com" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps7060/index.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63456" }, { "db": "BID", "id": "61659" }, { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "CNNVD", "id": "CNNVD-201308-126" }, { "db": "NVD", "id": "CVE-2013-3454" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-63456" }, { "db": "BID", "id": "61659" }, { "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "db": "CNNVD", "id": "CNNVD-201308-126" }, { "db": "NVD", "id": "CVE-2013-3454" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-08T00:00:00", "db": "VULHUB", "id": "VHN-63456" }, { "date": "2013-08-07T00:00:00", "db": "BID", "id": "61659" }, { "date": "2013-08-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "date": "2013-08-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-126" }, { "date": "2013-08-08T14:55:08.717000", "db": "NVD", "id": "CVE-2013-3454" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-09T00:00:00", "db": "VULHUB", "id": "VHN-63456" }, { "date": "2013-08-07T00:00:00", "db": "BID", "id": "61659" }, { "date": "2013-08-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003680" }, { "date": "2013-08-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-126" }, { "date": "2013-08-09T17:55:27.520000", "db": "NVD", "id": "CVE-2013-3454" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco TelePresence System Runs on device Cisco TelePresence System Software Vulnerable to change settings", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003680" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-126" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.