First published: Wed Jun 05 2019(Updated: )
A vulnerability in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software could allow an unauthenticated, remote attacker to cause an affected system to send arbitrary network requests. The vulnerability is due to improper restrictions on network services in the affected software. An attacker could exploit this vulnerability by sending malicious requests to the affected system. A successful exploit could allow the attacker to send arbitrary network requests sourced from the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Video Communication Server | <x12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1872 is a vulnerability in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software that could allow an unauthenticated, remote attacker to cause an affected system to send arbitrary network requests.
CVE-2019-1872 has a severity score of 5.3, which is considered medium.
Cisco TelePresence Video Communication Server (VCS) software up to version x12.5 is affected by CVE-2019-1872.
To fix CVE-2019-1872, it is recommended to upgrade the affected Cisco TelePresence Video Communication Server (VCS) software to a version that is not vulnerable.
You can find more information about CVE-2019-1872 on the Cisco Security Advisory page and the SecurityFocus website.