Lucene search

K
ciscoCiscoCISCO-SA-20150818-CVE-2015-4327
HistoryAug 18, 2015 - 10:10 p.m.

Cisco TelePresence Video Communication Server Expressway Arbitrary File Injection Vulnerability

2015-08-1822:10:55
tools.cisco.com
9

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the command-line interface (CLI) of the Cisco TelePresence Video Communication Server (VCS) Expressway could allow an authenticated, local attacker to inject arbitrary arguments to a script on an affected system.

The vulnerability is due to insufficient input validation of content on a local file. An attacker could exploit this vulnerability by writing arbitrary code to the affected file. An exploit could allow the attacker to write options to a file that has root privileges.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscotelepresence_video_communication_serverMatchanyexpressway
OR
ciscotelepresence_video_communication_serverMatchanyexpressway

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-20150818-CVE-2015-4327