Lucene search

K
cveCiscoCVE-2017-12249
HistorySep 13, 2017 - 10:29 p.m.

CVE-2017-12249

2017-09-1322:29:00
CWE-16
CWE-668
cisco
web.nvd.nist.gov
40
cve-2017-12249
cisco meeting server
turn server
vulnerability
security
unauthorized access
authentication
remote attack
information disclosure
cisco bug id

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.003

Percentile

69.9%

A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127.

Affected configurations

Nvd
Node
ciscomeeting_serverRange2.0.15
OR
ciscomeeting_serverMatch2.1.0
OR
ciscomeeting_serverMatch2.1.1
OR
ciscomeeting_serverMatch2.1.2
OR
ciscomeeting_serverMatch2.1.3
OR
ciscomeeting_serverMatch2.1.4
OR
ciscomeeting_serverMatch2.1.5
OR
ciscomeeting_serverMatch2.1.6
OR
ciscomeeting_serverMatch2.1.7
OR
ciscomeeting_serverMatch2.1.8
OR
ciscomeeting_serverMatch2.1.9
OR
ciscomeeting_serverMatch2.1.10
OR
ciscomeeting_serverMatch2.2.0
OR
ciscomeeting_serverMatch2.2.1
OR
ciscomeeting_serverMatch2.2.2
OR
ciscomeeting_serverMatch2.2.3
OR
ciscomeeting_serverMatch2.2.4
OR
ciscomeeting_serverMatch2.2.5
VendorProductVersionCPE
ciscomeeting_server*cpe:2.3:a:cisco:meeting_server:*:*:*:*:*:*:*:*
ciscomeeting_server2.1.0cpe:2.3:a:cisco:meeting_server:2.1.0:*:*:*:*:*:*:*
ciscomeeting_server2.1.1cpe:2.3:a:cisco:meeting_server:2.1.1:*:*:*:*:*:*:*
ciscomeeting_server2.1.2cpe:2.3:a:cisco:meeting_server:2.1.2:*:*:*:*:*:*:*
ciscomeeting_server2.1.3cpe:2.3:a:cisco:meeting_server:2.1.3:*:*:*:*:*:*:*
ciscomeeting_server2.1.4cpe:2.3:a:cisco:meeting_server:2.1.4:*:*:*:*:*:*:*
ciscomeeting_server2.1.5cpe:2.3:a:cisco:meeting_server:2.1.5:*:*:*:*:*:*:*
ciscomeeting_server2.1.6cpe:2.3:a:cisco:meeting_server:2.1.6:*:*:*:*:*:*:*
ciscomeeting_server2.1.7cpe:2.3:a:cisco:meeting_server:2.1.7:*:*:*:*:*:*:*
ciscomeeting_server2.1.8cpe:2.3:a:cisco:meeting_server:2.1.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 181

CNA Affected

[
  {
    "product": "Cisco Meeting Server",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco Meeting Server"
      }
    ]
  }
]

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.003

Percentile

69.9%

Related for CVE-2017-12249