Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2023-1043
Vulnerability from csaf_certbund
Published
2023-04-19 22:00
Modified
2023-04-19 22:00
Summary
Cisco TelePresence: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Cisco TelePresence Lösungen erlauben die weltweite Zusammenarbeit und Kommunikation von Kollegen, Partnern und Beobachtern.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco TelePresence ausnutzen, um seine Privilegien zu erhöhen, Dateien zu manipulieren oder Informationen offenzulegen.
Betroffene Betriebssysteme
- CISCO Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Cisco TelePresence L\u00f6sungen erlauben die weltweite Zusammenarbeit und Kommunikation von Kollegen, Partnern und Beobachtern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco TelePresence ausnutzen, um seine Privilegien zu erh\u00f6hen, Dateien zu manipulieren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1043 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1043.json" }, { "category": "self", "summary": "WID-SEC-2023-1043 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1043" }, { "category": "external", "summary": "Cisco Security Advisory CISCO-SA-ROOMOS-FILE-WRITE-RHKWEGKF vom 2023-04-19", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source_lang": "en-US", "title": "Cisco TelePresence: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-19T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:49:36.311+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1043", "initial_release_date": "2023-04-19T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco TelePresence \u003c 9.15.17.4", "product": { "name": "Cisco TelePresence \u003c 9.15.17.4", "product_id": "T027465", "product_identification_helper": { "cpe": "cpe:/h:cisco:telepresence:9.15.17.4" } } }, { "category": "product_name", "name": "Cisco TelePresence \u003c 11.1.2.4", "product": { "name": "Cisco TelePresence \u003c 11.1.2.4", "product_id": "T027466", "product_identification_helper": { "cpe": "cpe:/h:cisco:telepresence:11.1.2.4" } } }, { "category": "product_name", "name": "Cisco TelePresence \u003c RoomOS March 2023", "product": { "name": "Cisco TelePresence \u003c RoomOS March 2023", "product_id": "T027467", "product_identification_helper": { "cpe": "cpe:/h:cisco:telepresence:roomos_march_2023" } } } ], "category": "product_name", "name": "TelePresence" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20094", "notes": [ { "category": "description", "text": "In Cisco TelePresence existieren mehrere Schwachstellen. Diese sind auf verschiedene Fehler bei Zugriffskontrollen sowie Fehler bei der Kontrolle von Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Dateien zu manipulieren oder Informationen offenzulegen." } ], "release_date": "2023-04-19T22:00:00.000+00:00", "title": "CVE-2023-20094" }, { "cve": "CVE-2023-20093", "notes": [ { "category": "description", "text": "In Cisco TelePresence existieren mehrere Schwachstellen. Diese sind auf verschiedene Fehler bei Zugriffskontrollen sowie Fehler bei der Kontrolle von Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Dateien zu manipulieren oder Informationen offenzulegen." } ], "release_date": "2023-04-19T22:00:00.000+00:00", "title": "CVE-2023-20093" }, { "cve": "CVE-2023-20092", "notes": [ { "category": "description", "text": "In Cisco TelePresence existieren mehrere Schwachstellen. Diese sind auf verschiedene Fehler bei Zugriffskontrollen sowie Fehler bei der Kontrolle von Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Dateien zu manipulieren oder Informationen offenzulegen." } ], "release_date": "2023-04-19T22:00:00.000+00:00", "title": "CVE-2023-20092" }, { "cve": "CVE-2023-20091", "notes": [ { "category": "description", "text": "In Cisco TelePresence existieren mehrere Schwachstellen. Diese sind auf verschiedene Fehler bei Zugriffskontrollen sowie Fehler bei der Kontrolle von Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Dateien zu manipulieren oder Informationen offenzulegen." } ], "release_date": "2023-04-19T22:00:00.000+00:00", "title": "CVE-2023-20091" }, { "cve": "CVE-2023-20090", "notes": [ { "category": "description", "text": "In Cisco TelePresence existieren mehrere Schwachstellen. Diese sind auf verschiedene Fehler bei Zugriffskontrollen sowie Fehler bei der Kontrolle von Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Dateien zu manipulieren oder Informationen offenzulegen." } ], "release_date": "2023-04-19T22:00:00.000+00:00", "title": "CVE-2023-20090" }, { "cve": "CVE-2023-20004", "notes": [ { "category": "description", "text": "In Cisco TelePresence existieren mehrere Schwachstellen. Diese sind auf verschiedene Fehler bei Zugriffskontrollen sowie Fehler bei der Kontrolle von Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Dateien zu manipulieren oder Informationen offenzulegen." } ], "release_date": "2023-04-19T22:00:00.000+00:00", "title": "CVE-2023-20004" } ] }
CVE-2023-20090 (GCVE-0-2023-20090)
Vulnerability from cvelistv5
Published
2024-11-15 15:19
Modified
2024-11-15 17:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-27 - Path Traversal: 'dir/../../filename'
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.
This vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco RoomOS Software |
Version: N/A |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.9.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "telepresence_collaboration_endpoint", "vendor": "cisco", "versions": [ { "status": "affected", "version": "9.0.1" }, { "status": "affected", "version": "9.10.1" }, { "status": "affected", "version": "9.10.2" }, { "status": "affected", "version": "9.10.3" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.2" }, { "status": "affected", "version": "9.12.3" }, { "status": "affected", "version": "9.12.4" }, { "status": "affected", "version": "9.12.5" }, { "status": "affected", "version": "9.1.3" }, { "status": "affected", "version": "9.13.0" }, { "status": "affected", "version": "9.13.1" }, { "status": "affected", "version": "9.13.2" }, { "status": "affected", "version": "9.13.3" }, { "status": "affected", "version": "9.1.4" }, { "status": "affected", "version": "9.14.3" }, { "status": "affected", "version": "9.14.4" }, { "status": "affected", "version": "9.14.5" }, { "status": "affected", "version": "9.14.6" }, { "status": "affected", "version": "9.1.5" }, { "status": "affected", "version": "9.15.0.10" }, { "status": "affected", "version": "9.15.0.11" }, { "status": "affected", "version": "9.15.13.0" }, { "status": "affected", "version": "9.15.8.12" }, { "status": "affected", "version": "9.1.6" }, { "status": "affected", "version": "9.2.1" }, { "status": "affected", "version": "9.2.2" }, { "status": "affected", "version": "9.2.3" }, { "status": "affected", "version": "9.2.4" }, { "status": "affected", "version": "9.9.3" }, { "status": "affected", "version": "9.9.4" } ] }, { "cpes": [ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.25:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.3.26:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:9.15.8.12:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "telepresence_collaboration_endpoint", "vendor": "cisco", "versions": [ { "status": "affected", "version": "9.15.0.19" }, { "status": "affected", "version": "9.15.10.8" }, { "status": "affected", "version": "9.15.13.0" }, { "status": "affected", "version": "9.15.15.4" }, { "status": "affected", "version": "9.15.16.5" }, { "status": "affected", "version": "9.15.3.18" }, { "status": "affected", "version": "9.15.3.19" }, { "status": "affected", "version": "9.15.3.22" }, { "status": "affected", "version": "9.15.3.25" }, { "status": "affected", "version": "9.15.3.26" }, { "status": "affected", "version": "9.15.8.12" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20090", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:49:25.857316Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:15:43.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.15.4" }, { "status": "affected", "version": "CE9.15.16.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-27", "description": "Path Traversal: \u0027dir/../../filename\u0027", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:19:09.891Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc85883" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20090", "datePublished": "2024-11-15T15:19:09.891Z", "dateReserved": "2022-10-27T18:47:50.335Z", "dateUpdated": "2024-11-15T17:15:43.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20091 (GCVE-0-2023-20091)
Vulnerability from cvelistv5
Published
2024-11-15 15:15
Modified
2024-11-15 17:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-61 - UNIX Symbolic Link (Symlink) Following
Summary
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.
This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco TelePresence Endpoint Software (TC/CE) |
Version: CE9.10.2 Version: CE9.1.4 Version: CE9.9.3 Version: CE9.10.3 Version: CE9.1.5 Version: CE9.2.4 Version: CE9.10.1 Version: CE9.13.0 Version: CE9.1.2 Version: CE9.1.1 Version: CE9.9.4 Version: CE9.2.1 Version: CE9.1.3 Version: CE9.0.1 Version: CE9.1.6 Version: CE9.12.4 Version: CE9.2.2 Version: CE9.12.3 Version: CE9.2.3 Version: CE9.13.1 Version: CE9.14.3 Version: CE9.14.4 Version: CE9.13.2 Version: CE9.12.5 Version: CE9.14.5 Version: CE9.15.0.10 Version: CE9.15.0.11 Version: CE9.13.3 Version: CE9.15.0.13 Version: CE9.14.6 Version: CE9.15.3.17 Version: CE9.14.7 Version: CE9.15.0.19 Version: CE9.15.3.19 Version: CE9.15.3.18 Version: CE9.15.3.22 Version: CE9.15.8.12 Version: CE9.15.10.8 Version: CE9.15.3.26 Version: CE9.15.3.25 Version: CE9.15.13.0 Version: CE9.15.15.4 Version: CE9.15.16.5 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20091", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:47:56.924902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:48:19.183Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.15.4" }, { "status": "affected", "version": "CE9.15.16.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:15:03.615Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc71178" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20091", "datePublished": "2024-11-15T15:15:03.615Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T17:48:19.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20004 (GCVE-0-2023-20004)
Vulnerability from cvelistv5
Published
2024-11-15 15:23
Modified
2024-11-15 15:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.
These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.
Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco RoomOS Software |
Version: N/A |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20004", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:37:09.280084Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:37:26.021Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "defaultStatus": "unknown", "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "CE9.10.2" }, { "status": "affected", "version": "CE9.1.4" }, { "status": "affected", "version": "CE9.9.3" }, { "status": "affected", "version": "CE9.10.3" }, { "status": "affected", "version": "CE9.1.5" }, { "status": "affected", "version": "CE9.2.4" }, { "status": "affected", "version": "CE9.10.1" }, { "status": "affected", "version": "CE9.13.0" }, { "status": "affected", "version": "CE9.1.2" }, { "status": "affected", "version": "CE9.1.1" }, { "status": "affected", "version": "CE9.9.4" }, { "status": "affected", "version": "CE9.2.1" }, { "status": "affected", "version": "CE9.1.3" }, { "status": "affected", "version": "CE9.0.1" }, { "status": "affected", "version": "CE9.1.6" }, { "status": "affected", "version": "CE9.12.4" }, { "status": "affected", "version": "CE9.2.2" }, { "status": "affected", "version": "CE9.12.3" }, { "status": "affected", "version": "CE9.2.3" }, { "status": "affected", "version": "CE9.13.1" }, { "status": "affected", "version": "CE9.14.3" }, { "status": "affected", "version": "CE9.14.4" }, { "status": "affected", "version": "CE9.13.2" }, { "status": "affected", "version": "CE9.12.5" }, { "status": "affected", "version": "CE9.14.5" }, { "status": "affected", "version": "CE9.15.0.10" }, { "status": "affected", "version": "CE9.15.0.11" }, { "status": "affected", "version": "CE9.13.3" }, { "status": "affected", "version": "CE9.15.0.13" }, { "status": "affected", "version": "CE9.14.6" }, { "status": "affected", "version": "CE9.15.3.17" }, { "status": "affected", "version": "CE9.14.7" }, { "status": "affected", "version": "CE9.15.0.19" }, { "status": "affected", "version": "CE9.15.3.19" }, { "status": "affected", "version": "CE9.15.3.18" }, { "status": "affected", "version": "CE9.15.3.22" }, { "status": "affected", "version": "CE9.15.8.12" }, { "status": "affected", "version": "CE9.15.10.8" }, { "status": "affected", "version": "CE9.15.3.26" }, { "status": "affected", "version": "CE9.15.3.25" }, { "status": "affected", "version": "CE9.15.13.0" }, { "status": "affected", "version": "CE9.15.15.4" }, { "status": "affected", "version": "CE9.15.16.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:23:29.140Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc47206" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Write Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20004", "datePublished": "2024-11-15T15:23:29.140Z", "dateReserved": "2022-10-27T18:47:50.305Z", "dateUpdated": "2024-11-15T15:37:26.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20092 (GCVE-0-2023-20092)
Vulnerability from cvelistv5
Published
2024-11-15 15:12
Modified
2024-11-15 15:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-61 - UNIX Symbolic Link (Symlink) Following
Summary
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.
These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.
Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco RoomOS Software |
Version: N/A |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20092", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:42:30.481069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:42:48.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:12:58.590Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc47236" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20092", "datePublished": "2024-11-15T15:12:58.590Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T15:42:48.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20093 (GCVE-0-2023-20093)
Vulnerability from cvelistv5
Published
2024-11-15 15:11
Modified
2024-11-15 15:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-61 - UNIX Symbolic Link (Symlink) Following
Summary
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.
These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.
Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco RoomOS Software |
Version: N/A |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20093", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:42:49.987851Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:43:07.839Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:11:19.884Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwc71187" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Overwrite Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20093", "datePublished": "2024-11-15T15:11:19.884Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T15:43:07.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20094 (GCVE-0-2023-20094)
Vulnerability from cvelistv5
Published
2024-11-15 15:08
Modified
2024-11-15 15:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.
This vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.
Note: This vulnerability only affects Cisco Webex Desk Hub.
There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco RoomOS Software |
Version: N/A |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20094", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:43:09.416209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:43:30.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco RoomOS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco TelePresence Endpoint Software (TC/CE)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.\r\n\r\nThis vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.\r\nNote: This vulnerability only affects Cisco Webex Desk Hub.\r\nThere are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:08:14.206Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-roomos-file-write-rHKwegKf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf" } ], "source": { "advisory": "cisco-sa-roomos-file-write-rHKwegKf", "defects": [ "CSCwb86296" ], "discovery": "INTERNAL" }, "title": "Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20094", "datePublished": "2024-11-15T15:08:04.290Z", "dateReserved": "2022-10-27T18:47:50.336Z", "dateUpdated": "2024-11-15T15:43:30.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…