Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xm4r-pr55-hfw3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS.

A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS.

EPSS

Процентиль: 80%
0.01388
Низкий

Связанные уязвимости

CVSS3: 7.2
nvd
больше 5 лет назад

A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS.

CVSS3: 7.2
fstec
больше 5 лет назад

Уязвимость службы обновления микропрограммного обеспечения устройств управления конференц-связью Cisco TelePresence Collaboration Endpoint Software и операционной системы Cisco RoomOS, позволяющая нарушителю изменить файловую систему и вызвать отказ в обслуживании или получить привилегированный доступ к корневой файловой системе

EPSS

Процентиль: 80%
0.01388
Низкий