Логотип exploitDog
bind:CVE-2019-1660
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1660

Количество 3

Количество 3

nvd логотип

CVE-2019-1660

около 7 лет назад

A vulnerability in the Simple Object Access Protocol (SOAP) of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to a lack of proper access and authentication controls on the affected TMS software. An attacker could exploit this vulnerability by gaining access to internal, trusted networks to send crafted SOAP calls to the affected device. If successful, an exploit could allow the attacker to access system management tools. Under normal circumstances, this access should be prohibited.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-58c5-wgv2-v53h

больше 3 лет назад

A vulnerability in the Simple Object Access Protocol (SOAP) of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to a lack of proper access and authentication controls on the affected TMS software. An attacker could exploit this vulnerability by gaining access to internal, trusted networks to send crafted SOAP calls to the affected device. If successful, an exploit could allow the attacker to access system management tools. Under normal circumstances, this access should be prohibited.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2019-00742

около 7 лет назад

Уязвимость компонента Simple Object Access Protocol программного средства централизованного управления видеосистемами предприятия Cisco TelePresence Management Suite, позволяющая нарушителю получить доступ к инструментам управления

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1660

A vulnerability in the Simple Object Access Protocol (SOAP) of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to a lack of proper access and authentication controls on the affected TMS software. An attacker could exploit this vulnerability by gaining access to internal, trusted networks to send crafted SOAP calls to the affected device. If successful, an exploit could allow the attacker to access system management tools. Under normal circumstances, this access should be prohibited.

CVSS3: 5.3
2%
Низкий
около 7 лет назад
github логотип
GHSA-58c5-wgv2-v53h

A vulnerability in the Simple Object Access Protocol (SOAP) of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to a lack of proper access and authentication controls on the affected TMS software. An attacker could exploit this vulnerability by gaining access to internal, trusted networks to send crafted SOAP calls to the affected device. If successful, an exploit could allow the attacker to access system management tools. Under normal circumstances, this access should be prohibited.

CVSS3: 5.3
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00742

Уязвимость компонента Simple Object Access Protocol программного средства централизованного управления видеосистемами предприятия Cisco TelePresence Management Suite, позволяющая нарушителю получить доступ к инструментам управления

CVSS3: 5.3
2%
Низкий
около 7 лет назад

Уязвимостей на страницу