You are here

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

June 21, 2013 - 6:00am

Addthis

PROBLEM:

Three vulnerabilities were reported in Cisco TelePresence TC and TE

PLATFORM:

The following product models are affected by the vulnerabilities:
Cisco TelePresence MX Series
Cisco TelePresence System EX Series
Cisco TelePresence Integrator C Series
Cisco TelePresence Profiles Series running
Cisco TelePresence Quick Set Series
Cisco IP Video Phone E20

ABSTRACT:

Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition.  Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

REFERENCE LINKS:

SecurityTracker Alert ID:  1028682
Secunia Advisory SA53730
Cisco Advisory cisco-sa-20130619-tpc
CVE-2013-3377
CVE-2013-3378
CVE-2013-3379

IMPACT ASSESSMENT:

Medium

DISCUSSION:

Cisco TelePresence TC and TE Software contains two different vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated, remote attacker to cause a denial of service condition.  Both vulnerabilities are due to insufficient validation of crafted SIP packets sent to the affected system. An attacker could exploit both vulnerabilities by sending crafted SIP packets to the affected system.

A vulnerability in the implementation of firewall rules could allow an unauthenticated, adjacent attacker to gain root shell access to an affected system.

IMPACT:

Successful exploitation of the Cisco TelePresence TC and TE Software SIP DoS vulnerabilities may cause the affected system to become unresponsive or reload.

Successful exploitation of the Cisco TelePresence TC Software Adjacent root Access Vulnerability  could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

SOLUTION:

Vendor recommends updating to current versions

Addthis