Lucene search

K
ciscoCiscoCISCO-SA-20140123-CVE-2014-0675
HistoryJan 23, 2014 - 4:44 p.m.

Cisco TelePresence Video Communication Server Expressway Default SSL Certificate Vulnerability

2014-01-2316:44:48
tools.cisco.com
22

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

EPSS

0.004

Percentile

72.7%

A vulnerability in the Cisco TelePresence Video Communication Server
(VCS) Expressway could allow an unauthenticated, remote attacker to
execute a man-in-the-middle (MITM) attack between one or more affected
devices.

The vulnerability occurs because the same default
SSL certificate is used across all Cisco TelePresence VCS Expressway devices. An attacker could
exploit this vulnerability by using the default SSL certificate
to intercept, decrypt, read, and write information between one or
more of the affected devices.

Cisco has confirmed the vulnerability in a security notice and released software updates.

It is likely that one or more affected devices that an attacker could attempt to exploit would be placed on trusted, internal networks behind firewall restrictions. An attacker may require access to this network, which may reduce the likelihood of a successful exploit.

Affected configurations

Vulners
Node
ciscotelepresence_video_communication_serverMatchany
OR
ciscotelepresence_video_communication_serverMatchany
VendorProductVersionCPE
ciscotelepresence_video_communication_serveranycpe:2.3:h:cisco:telepresence_video_communication_server:any:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

EPSS

0.004

Percentile

72.7%

Related for CISCO-SA-20140123-CVE-2014-0675