6.9
CVSSv2

CVE-2015-4325

Published: 12/10/2015 Updated: 04/01/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the process management code of the Cisco TelePresence Video Communication Server (VCS) Expressway could allow an authenticated, local malicious user to run arbitrary programs with elevated privileges. The vulnerability is due to the failure to protect a supervised process. An attacker could exploit this vulnerability by completing a series of steps that ultimately allows a lower-privileged process to be restarted with root privilege. An attacker would need to crash a firestarter.py supervised process before the privilege is escalated after the process is restarted. A successful exploit could allow the malicious user to gain elevated privileges on the device, which could result in a complete system compromise. Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151006-vcs

Vulnerable Product Search on Vulmon Subscribe to Product

cisco telepresence video communication server software x8.5.2

Vendor Advisories

A vulnerability in the process management code of the Cisco TelePresence Video Communication Server (VCS) Expressway could allow an authenticated, local attacker to run arbitrary programs with elevated privileges The vulnerability is due to the failure to protect a supervised process An attacker could exploit this vulnerability by completing a s ...