5
CVSSv2

CVE-2019-1660

Published: 07/02/2019 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A vulnerability in the Simple Object Access Protocol (SOAP) of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote malicious user to gain unauthorized access to an affected device. The vulnerability is due to a lack of proper access and authentication controls on the affected TMS software. An attacker could exploit this vulnerability by gaining access to internal, trusted networks to send crafted SOAP calls to the affected device. If successful, an exploit could allow the malicious user to access system management tools. Under normal circumstances, this access should be prohibited.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco telepresence management suite 15.3

cisco telepresence management suite 15.4

cisco telepresence management suite 15.5

cisco telepresence management suite 15.6

cisco telepresence management suite 15.0

cisco telepresence management suite 15.2.1

cisco telepresence management suite 15.7

cisco telepresence management suite 15.1

Vendor Advisories

Cisco TelePresence Management Suite (TMS) software implements a Simple Object Access Protocol (SOAP) interface that by design allows unauthenticated access to web services designed to provide management features to devices At first publication of the advisory, the management feature was not documented and may have represented unknown risks to cust ...

Github Repositories

cs-reaource-links These webages are all learning resources that i use wwwcvedetailscom githubcom/rayiik/awesome-network-analysis/tree/master githubcom/rayiik/awesome-networking githubcom/rayiik/awesome-network-automation githubcom/rayiik/CheatSheetSeries enwikipediaorg/wiki/List_of_TCP_and_UDP_port_numbers ht