Multiple Vulnerabilities in Cisco TelePresence TC and TE Software

2013-06-19T16:00:00
ID CISCO-SA-20130619-TPC
Type cisco
Reporter Cisco
Modified 2013-06-20T11:46:05

Description

A vulnerability in the implementation of firewall rules could allow an unauthenticated, adjacent attacker to gain root shell access to an affected system.

The vulnerability is due to improper implementation of allowed hosts in the firewall rules. An attacker could exploit this vulnerability by connecting to the management IP address of the affected system. The attacker would need to be logically or physically adjacent to exploit this vulnerability. An exploit could allow the attacker to gain root access to the shell.

A vulnerability in the implementation of the Session Initiation Protocol (SIP) engine of Cisco TelePresence products running Cisco TelePresence TC and TE Software could allow an unauthenticated, remote attacker to cause the affected device to become unresponsive.

The vulnerability is due to insufficient validation of crafted SIP packets. An attacker could exploit this vulnerability by sending a SIP packet to the affected system. An exploit could allow the attacker to cause the affected device to become unresponsive for a certain amount of time. Repeated exploitation may cause a denial of service (DoS) condition.

A vulnerability in the implementation of the Session Initiation Protocol (SIP) engine of Cisco TelePresence products running Cisco TelePresence TC and TE Software could allow an unauthenticated, remote attacker to trigger the reload of the affected system.

The vulnerability is due to insufficient validation of crafted SIP packets. An attacker could exploit this vulnerability by sending a SIP packet to the affected system.

Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition.

Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

Cisco has released software updates that address these vulnerabilities. Workarounds that mitigate the Cisco TelePresence TC and TE Software SIP Denial of Service vulnerabilities are available. This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc"]