Lucene search

K
ciscoCiscoCISCO-SA-20150901-CVE-2015-4330
HistorySep 01, 2015 - 1:35 p.m.

Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability

2015-09-0113:35:09
tools.cisco.com
12

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%

A vulnerability in a local file script in Cisco TelePresence Video Communication Server (VCS) Expressway could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with elevated privilege.

The vulnerability is due to insufficient protection of a specific local file script. An attacker could exploit this vulnerability by providing invalid parameters to a local file. An exploit could allow the attacker to execute arbitrary code on the underlying operating system with elevated privileges.

Cisco has confirmed the vulnerability and released software updates.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscotelepresence_video_communication_serverMatchanyexpressway
OR
ciscotelepresence_video_communication_serverMatchanyexpressway

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%

Related for CISCO-SA-20150901-CVE-2015-4330