First published: Thu Aug 20 2015(Updated: )
The password-change feature in the administrative web interface in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.1 improperly performs authorization, which allows remote authenticated users to reset arbitrary active-user passwords via unspecified vectors, aka Bug ID CSCuv12338.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Video Communication Server Firmware | =x8.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4319 has a medium severity rating due to its potential for unauthorized password resets.
To fix CVE-2015-4319, upgrade your Cisco TelePresence Video Communication Server to a version that includes the patch addressing this vulnerability.
Exploitation of CVE-2015-4319 allows authenticated users to reset passwords of any active user, leading to potential unauthorized access.
Yes, Cisco TelePresence Video Communication Server version x8.5.1 is specifically identified as affected by CVE-2015-4319.
CVE-2015-4319 can be exploited by remote authenticated users who gain access to the administrative web interface.