Lucene search

K
ciscoCiscoCISCO-SA-20140123-CVE-2014-0675
HistoryJan 23, 2014 - 4:44 p.m.

Cisco TelePresence Video Communication Server Expressway Default SSL Certificate Vulnerability

2014-01-2316:44:48
tools.cisco.com
19

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.7%

A vulnerability in the Cisco TelePresence Video Communication Server
(VCS) Expressway could allow an unauthenticated, remote attacker to
execute a man-in-the-middle (MITM) attack between one or more affected
devices.

The vulnerability occurs because the same default
SSL certificate is used across all Cisco TelePresence VCS Expressway devices. An attacker could
exploit this vulnerability by using the default SSL certificate
to intercept, decrypt, read, and write information between one or
more of the affected devices.

Cisco has confirmed the vulnerability in a security notice and released software updates.

It is likely that one or more affected devices that an attacker could attempt to exploit would be placed on trusted, internal networks behind firewall restrictions. An attacker may require access to this network, which may reduce the likelihood of a successful exploit.

Affected configurations

Vulners
Node
ciscotelepresence_video_communication_serverMatchany
OR
ciscotelepresence_video_communication_serverMatchany

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.7%

Related for CISCO-SA-20140123-CVE-2014-0675