Vulnerabilites related to cisco - ip_video_phone_e20
Vulnerability from fkie_nvd
Published
2012-01-19 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_e20_software | * | |
cisco | telepresence_e20_software | te2.2 | |
cisco | telepresence_e20_software | te2.2.1 | |
cisco | telepresence_e20_software | te4.0.0 | |
cisco | telepresence_e20_software | te4.1.0 | |
cisco | telepresence_e20_software | te4.1.1 | |
cisco | telepresence_e20_software | tenc4.0.0 | |
cisco | telepresence_e20_software | tenc4.1.0 | |
cisco | telepresence_e20_software | tenc4.1.1 | |
cisco | telepresence_e20_software | tenc4.1.1-cucm | |
cisco | ip_video_phone_e20 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F283D9C2-6417-4164-ABCF-92CDCEE0369F", "versionEndIncluding": "te4.1.1-cucm", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6F1FA842-B89F-4297-8C32-E07E8DD64A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F1890CD-A9DE-426A-9769-BD69D38C38AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "71BC3E49-C15E-4658-BC03-F0AC5913B4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A0F3990-2C2F-4CF7-9F8B-2F799A89FA2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2AC50D6-6989-4E1D-A5EF-BA8BCC90F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D31C6E3-3D59-4980-B1C9-1F8F625CF1D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B75F0545-9A8D-4199-9BD0-CC4FA590DD8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6D61CB9-78CE-4FB7-BBC8-F94E4D59BB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.1-cucm:*:*:*:*:*:*:*", "matchCriteriaId": "75788217-A69B-4F08-B16C-A2A8BE9FD32A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555." }, { "lang": "es", "value": "Cisco TelePresence Software antes de TE v4.1.1 en el Cisco IP Video Phone E20 tiene una contrase\u00f1a por defecto para la cuenta de root tras una actualizaci\u00f3n a la v4.1.0 TE, lo cual permite modificar la configuraci\u00f3n a trav\u00e9s de una sesi\u00f3n SSH a atacantes remotos. Se trata de un problema tambi\u00e9n conocido como Bug ID CSCtw69889 y es diferente al CVE-2011-2555." } ], "id": "CVE-2011-4659", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-19T15:55:00.820", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-21 13:57
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D79CCC-6C2D-48ED-A377-96C11B52E1F5", "versionEndIncluding": "5.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E492709-66DB-4491-AC15-550398099903", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "88A64CA3-C8E8-4DCB-B865-1767EE178F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A19AC9B-91B4-4691-BFB7-BEC9A3CD2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C4C16D2-4FFC-45C5-B3D8-26EF76482B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "02184B87-A8D9-4445-A6FC-F1F5DDE0DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9AEFCD2A-167A-4897-BF94-42876763F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A94F378C-506E-4C0A-A23A-1F71ABDBD7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB451E1B-9B64-434B-BA1E-FFE9CD472CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D46D718-4708-4018-A1E2-2094519E9E3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87CEA3A-2CF3-48DF-935F-31553CAC1ED8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0754B77C-E888-461E-AA1E-74B78DA59B78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BFF6AA3-4850-40A3-8211-82F60F14ACD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex60:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2E19CC-A0CF-4A06-A8DC-85C056346F68", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex90:-:*:*:*:*:*:*:*", "matchCriteriaId": "B508A1D2-4905-4AA0-A65C-DD4C4FD0A64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx200:-:*:*:*:*:*:*:*", "matchCriteriaId": "392D3BBE-8C2D-4643-95DB-79CF5CEDBC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx300:-:*:*:*:*:*:*:*", "matchCriteriaId": "63ED55F5-C88A-463D-9D5D-347D8C85AC43", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "5898916F-DFF0-4474-A704-8330B6DC8056", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "28E0F948-CD09-4A2D-A2BB-0FC16D7A023F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_c20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB9081F-3B87-4D60-AD41-7EE977BCA017", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_sx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DF7B58-4E88-497B-A1D8-A0E23A6B6223", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A7CD062-2DC4-4BED-A086-D10FC4621D7A", "versionEndIncluding": "4.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0E087F5-72E1-4F05-8BDF-F57DEA460CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A98835A-1E5E-4123-B878-6B0D268A87D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87CEA3A-2CF3-48DF-935F-31553CAC1ED8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0754B77C-E888-461E-AA1E-74B78DA59B78", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BFF6AA3-4850-40A3-8211-82F60F14ACD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex60:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A2E19CC-A0CF-4A06-A8DC-85C056346F68", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_ex90:-:*:*:*:*:*:*:*", "matchCriteriaId": "B508A1D2-4905-4AA0-A65C-DD4C4FD0A64A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx200:-:*:*:*:*:*:*:*", "matchCriteriaId": "392D3BBE-8C2D-4643-95DB-79CF5CEDBC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mx300:-:*:*:*:*:*:*:*", "matchCriteriaId": "63ED55F5-C88A-463D-9D5D-347D8C85AC43", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_55:-:*:*:*:*:*:*:*", "matchCriteriaId": "5898916F-DFF0-4474-A704-8330B6DC8056", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_profile_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "28E0F948-CD09-4A2D-A2BB-0FC16D7A023F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_c20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB9081F-3B87-4D60-AD41-7EE977BCA017", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_quick_set_sx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DF7B58-4E88-497B-A1D8-A0E23A6B6223", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743." }, { "lang": "es", "value": "Cisco TelePresence TC Software anterior a v5.1.7 y TE Software anterior a v4.1.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) mediante paquetes SIP especialmente dise\u00f1ados, tambi\u00e9n conocido como Bug ID CSCue01743." } ], "id": "CVE-2013-3377", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-21T13:57:25.623", "references": [ { "source": "psirt@cisco.com", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-3377 (GCVE-0-2013-3377)
Vulnerability from cvelistv5
Published
2013-06-21 10:00
Modified
2024-09-17 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-21T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-3377", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence TC Software before 5.1.7 and TE Software before 4.1.3 allow remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCue01743." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130619 Multiple Vulnerabilities in Cisco TelePresence TC and TE Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130619-tpc" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-3377", "datePublished": "2013-06-21T10:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T03:18:46.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4659 (GCVE-0-2011-4659)
Vulnerability from cvelistv5
Published
2012-01-19 15:00
Modified
2024-09-17 03:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:19.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120118 Cisco IP Video Phone E20 Default Root Account", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T15:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120118 Cisco IP Video Phone E20 Default Root Account", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-4659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120118 Cisco IP Video Phone E20 Default Root Account", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-4659", "datePublished": "2012-01-19T15:00:00Z", "dateReserved": "2011-12-01T00:00:00Z", "dateUpdated": "2024-09-17T03:42:52.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }