Cisco TelePresence Endpoint devices contain the following vulnerabilities: Cisco TelePresence API Remote Command Execution Vulnerability Cisco TelePresence Remote Command Execution Vulnerability Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability Exploitation of the API Remote Command Execution vulnerability could allow an unauthenticated, adjacent attacker to inject commands into API requests. The injected commands will be executed by the underlying operating system in an elevated context. Exploitation of the Remote Command Execution vulnerability could allow an authenticated, remote attacker to inject commands into requests made to the Administrative Web interface. The injected commands will be executed by the underlying operating system in an elevated context. Exploitation of the Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability may allow an unauthenticated, adjacent attacker to execute arbitrary code with elevated privileges. Cisco has released software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
Cisco TelePresence Endpoint devices contain the following vulnerabilities:
Product | Affected |
---|---|
Cisco TelePresence Manager |
NO |
Cisco TelePresence Recording Server | NO |
Cisco TelePresence Multipoint Switch | NO |
Cisco TelePresence Immersive Endpoint System | YES |
Product | Affected |
---|---|
Cisco TelePresence Manager | NO |
Cisco TelePresence Recording Server | NO |
Cisco TelePresence Multipoint Switch | NO |
Cisco TelePresence Immersive Endpoint System | YES |
Product | Affected |
---|---|
Cisco TelePresence Manager | YES |
Cisco TelePresence Recording Server | YES |
Cisco TelePresence Multipoint Switch | YES |
Cisco TelePresence Immersive Endpoint System | YES |
Product | Security Advisory Publication Link |
---|---|
Cisco TelePresence Multipoint Switch | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms |
Cisco TelePresence Manager | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman |
Cisco TelePresence Recording Server | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs |
Cisco TelePresence Recording Server devices that are running an affected version of software are affected.
To determine the current version of software that is running on Cisco TelePresence Endpoint Systems, establish an SSH connection to the device and issue the show version active and the show version inactive commands. The output should resemble the following example:
admin: show version active Active Master Version: 1.7.0.0-471 Active Version Installed Software Options: No Installed Software Options Found. admin: show version inactive Inactive Master Version: 1.6.0.0-342 Inactive Version Installed Software Options: No Installed Software Options Found.
In the preceding example, the system has versions 1.6.0 and 1.7.0 loaded on the device, and version 1.7.0 is currently active. A device is affected only by vulnerabilities that are in the active software version.
There are no workarounds that mitigate these vulnerabilities.
This section gives details about affected releases and remediation for each of the vulnerabilities affecting Cisco TelePresence Immersive Endpoint Systems.
Cisco TelePresence API Remote Command Execution Vulnerability
Version | First Fixed Release |
---|---|
Prior to 1.6 |
1.8.4 or 1.9.1 |
1.6 |
1.8.4 or 1.9.1 |
1.7 |
1.8.4 or 1.9.1 |
1.8 |
1.8.4 or 1.9.1 |
Version | First Fixed Release |
---|---|
Prior to 1.6 |
1.7.4 |
1.6 |
1.7.4 |
1.7 | 1.7.4 |
1.7.4 and later |
Not affected |
1.8 |
Not affected |
Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability
Version | First Fixed Release |
---|---|
Prior to 1.6 |
1.8.4 or 1.9.1 |
1.6 |
1.8.4 or 1.9.1 |
1.7 |
1.8.4 or 1.9.1 |
1.8 |
1.8.4 or 1.9.1 |
Recommended Releases
The following table gives information about the releases that contains the fixes for all the vulnerabilities described in this security advisory:
Version | Release |
---|---|
Prior to 1.6 |
Upgrade to 1.9.1 or later |
1.6 |
Upgrade to 1.9.1 or later |
1.7 |
Upgrade to 1.9.1 or later |
1.8 |
Upgrade to 1.8.4 or upgrade to 1.9.1 or later |
When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
These vulnerabilities were discovered during an internal security audit of the Cisco TelePresence Endpoints.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Revision 1.1 | 2012-September-24 | Cisco has released software version 1.8.4, which remediates the following CVEs in the 1.8.x Train:CVE-2012-2486, CVE-2012-3074, and CVE-2012-3075 |
Revision 1.0 | 2012-July-11 | Initial public release. |
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.