mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
140 lines
5.0 KiB
JSON
140 lines
5.0 KiB
JSON
{
|
|
"id": "CVE-2011-4659",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2012-01-19T15:55:00.820",
|
|
"lastModified": "2012-02-10T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco TelePresence Software before TE 4.1.1 on the Cisco IP Video Phone E20 has a default password for the root account after an upgrade to TE 4.1.0, which makes it easier for remote attackers to modify the configuration via an SSH session, aka Bug ID CSCtw69889, a different vulnerability than CVE-2011-2555."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco TelePresence Software antes de TE v4.1.1 en el Cisco IP Video Phone E20 tiene una contrase\u00f1a por defecto para la cuenta de root tras una actualizaci\u00f3n a la v4.1.0 TE, lo cual permite modificar la configuraci\u00f3n a trav\u00e9s de una sesi\u00f3n SSH a atacantes remotos. Se trata de un problema tambi\u00e9n conocido como Bug ID CSCtw69889 y es diferente al CVE-2011-2555."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "te4.1.1-cucm",
|
|
"matchCriteriaId": "F283D9C2-6417-4164-ABCF-92CDCEE0369F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F1FA842-B89F-4297-8C32-E07E8DD64A3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F1890CD-A9DE-426A-9769-BD69D38C38AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71BC3E49-C15E-4658-BC03-F0AC5913B4BC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A0F3990-2C2F-4CF7-9F8B-2F799A89FA2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2AC50D6-6989-4E1D-A5EF-BA8BCC90F8EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D31C6E3-3D59-4980-B1C9-1F8F625CF1D0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B75F0545-9A8D-4199-9BD0-CC4FA590DD8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6D61CB9-78CE-4FB7-BBC8-F94E4D59BB3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:tenc4.1.1-cucm:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "75788217-A69B-4F08-B16C-A2A8BE9FD32A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ip_video_phone_e20:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBFD8721-837D-4FD8-A84F-D844E5C199D5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120118-te",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |