First published: Fri Jun 21 2013(Updated: )
The firewall subsystem in Cisco TelePresence TC Software before 4.2 does not properly implement rules that grant access to hosts, which allows remote attackers to obtain shell access with root privileges by leveraging connectivity to the management network, aka Bug ID CSCts37781.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence TC | <=4.1.2 | |
Cisco TelePresence TC | =4.0.0 | |
Cisco TelePresence TC | =4.0.1 | |
Cisco TelePresence TC | =4.0.4 | |
Cisco TelePresence TC | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3379 is classified as a high severity vulnerability due to its potential for remote attackers to gain root shell access.
To fix CVE-2013-3379, upgrade your Cisco TelePresence TC Software to version 4.2 or later.
CVE-2013-3379 affects Cisco TelePresence TC Software versions up to 4.1.2, including specific versions like 4.0.0, 4.0.1, 4.0.4, and 4.1.1.
CVE-2013-3379 can facilitate remote code execution attacks, allowing unauthorized users to gain shell access with root privileges.
There are no specific workarounds provided for CVE-2013-3379, so it is recommended to upgrade to the secure version as soon as possible.