First published: Tue Apr 13 2010(Updated: )
The SSH service on the TANDBERG Video Communication Server (VCS) before X5.1 uses a fixed DSA key, which makes it easier for remote attackers to conduct man-in-the-middle attacks and spoof arbitrary servers via crafted SSH packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tandberg Video Communication Server | =x2.1.0 | |
Tandberg Video Communication Server | =x1.0.0 | |
Tandberg Video Communication Server | =x4.1.0 | |
Tandberg Video Communication Server | =x3.1.0 | |
Tandberg Video Communication Server | =x3.0.0 | |
Tandberg Video Communication Server | =x1.1.0 | |
Tandberg Video Communication Server | =x4.2.0 | |
Tandberg Video Communication Server | <=x5.0.0 | |
Tandberg Video Communication Server | =x4.2.1 | |
Tandberg Video Communication Server | =x1.2.0 | |
Tandberg Video Communication Server | =x4.3.0 | |
Tandberg Video Communication Server | =x2.0.0 | |
<=x5.0.0 | ||
=x1.0.0 | ||
=x1.1.0 | ||
=x1.2.0 | ||
=x2.0.0 | ||
=x2.1.0 | ||
=x3.0.0 | ||
=x3.1.0 | ||
=x4.1.0 | ||
=x4.2.0 | ||
=x4.2.1 | ||
=x4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4510 has a high severity level due to the potential for man-in-the-middle attacks.
To fix CVE-2009-4510, upgrade the TANDBERG Video Communication Server to version X5.1 or later.
The risks include unauthorized access to sensitive data and the ability for attackers to spoof arbitrary servers.
Versions prior to X5.1, including all versions up to X4.3.0, are affected by CVE-2009-4510.
The attack vector for CVE-2009-4510 involves sending crafted SSH packets to exploit the fixed DSA key in the service.