SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Multimedia)  >   Cisco TelePresence Vendors:   Cisco
Cisco TelePresence Products Let Remote Users Conduct Cross-Site Request Forgery Attacks
SecurityTracker Alert ID:  1032838
SecurityTracker URL:  http://securitytracker.com/id/1032838
CVE Reference:   CVE-2015-4252, CVE-2015-4253, CVE-2015-4254, CVE-2015-4255, CVE-2015-4256, CVE-2015-4257, CVE-2015-4258   (Links to External Site)
Updated:  Jul 10 2015
Original Entry Date:  Jul 10 2015
Impact:   Modification of user information
Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in several Cisco TelePresence products. A remote user can conduct cross-site request forgery attacks.

A remote user can create a specially crafted HTML page or URL that, when loaded by the target authenticated user, will take actions on the target interface acting as the target user.

The Cisco TelePresence IP Gateway version 2.0(3.34) is affected [CVE-2015-4255]. The vendor has assigned bug ID CSCuu90734 to this vulnerability.

The Cisco TelePresence MSE 8000 Series is affected [CVE-2015-4258]. The vendor has assigned bug ID CSCuu90444 to this vulnerability.

The Cisco TelePresence MCU 4500 release 4.5(1.55) is affected [CVE-2015-4257]. The vendor has assigned bug ID CSCuu90710 to this vulnerability.

The Cisco TelePresence Serial Gateway version 1.0(1.42) is affected [CVE-2015-4253]. The vendor has assigned bug ID CSCuu90728 to this vulnerability.

The Cisco TelePresence ISDN Gateway version 2.2(1.106) is affected [CVE-2015-4252]. The vendor has assigned bug ID CSCuu90724 to this vulnerability.

The Cisco TelePresence IP VCR version 3.0(1.27) is affected [CVE-2015-4256]. The vendor has assigned bug ID CSCuu90736 to this vulnerability.

The Cisco TelePresence Advanced Media Gateway version 1.1(1.40) is affected [CVE-2015-4254]. The vendor has assigned bug ID CSCuu90732 to this vulnerability.

Impact:   A remote user can take actions on the target system acting as the target authenticated user.
Solution:   No solution was available at the time of this entry.

The vendor's advisories are available at:

http://tools.cisco.com/security/center/viewAlert.x?alertId=39795
http://tools.cisco.com/security/center/viewAlert.x?alertId=39796
http://tools.cisco.com/security/center/viewAlert.x?alertId=39797
http://tools.cisco.com/security/center/viewAlert.x?alertId=39798
http://tools.cisco.com/security/center/viewAlert.x?alertId=39800
http://tools.cisco.com/security/center/viewAlert.x?alertId=39801
http://tools.cisco.com/security/center/viewAlert.x?alertId=39802

Vendor URL:  tools.cisco.com/security/center/viewAlert.x?alertId=39798 (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC