First published: Tue Apr 13 2010(Updated: )
The administrative web console on the TANDBERG Video Communication Server (VCS) before X4.3 uses predictable session cookies in (1) tandberg/web/lib/secure.php and (2) tandberg/web/user/lib/secure.php, which makes it easier for remote attackers to bypass authentication, and execute arbitrary code by loading a custom software update, via a crafted "Cookie: tandberg_login=" HTTP header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tandberg Video Communication Server | <=x4.2.1 | |
Tandberg Video Communication Server | =x1.0.0 | |
Tandberg Video Communication Server | =x1.1.0 | |
Tandberg Video Communication Server | =x1.2.0 | |
Tandberg Video Communication Server | =x2.0.0 | |
Tandberg Video Communication Server | =x2.1.0 | |
Tandberg Video Communication Server | =x3.0.0 | |
Tandberg Video Communication Server | =x3.1.0 | |
Tandberg Video Communication Server | =x4.1.0 | |
Tandberg Video Communication Server | =x4.2.0 | |
<=x4.2.1 | ||
=x1.0.0 | ||
=x1.1.0 | ||
=x1.2.0 | ||
=x2.0.0 | ||
=x2.1.0 | ||
=x3.0.0 | ||
=x3.1.0 | ||
=x4.1.0 | ||
=x4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4509 is considered to have a high severity level due to its potential for remote code execution and authentication bypass.
To fix CVE-2009-4509, it is recommended to upgrade the TANDBERG Video Communication Server to version X4.3 or later.
CVE-2009-4509 mainly exposes predictable session cookies, allowing attackers to bypass authentication and execute arbitrary code.
Versions of TANDBERG Video Communication Server prior to X4.3 and including X1.0.0 to X4.2.1 are affected by CVE-2009-4509.
Yes, CVE-2009-4509 can be exploited remotely by attackers to bypass authentication and potentially take control of the system.