First published: Thu Aug 20 2015(Updated: )
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS commands via crafted HTTP requests, as demonstrated by read or write operations on the Unified Communications lookup page, aka Bug ID CSCuv12552.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Video Communication Server Firmware | =x8.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4328 has been rated as critical due to its potential for allowing unauthorized command execution.
To remediate CVE-2015-4328, upgrade to a fixed version of the Cisco TelePresence Video Communication Server software.
CVE-2015-4328 affects Cisco TelePresence Video Communication Server Software version x8.5.2.
CVE-2015-4328 is a command injection vulnerability that allows remote authenticated users to execute arbitrary OS commands.
Exploitation of CVE-2015-4328 can occur through crafted HTTP requests sent by an authenticated user.