First published: Wed Oct 16 2019(Updated: )
Multiple vulnerabilities in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to overwrite arbitrary files. The vulnerabilities are due to insufficient permission enforcement. An attacker could exploit these vulnerabilities by authenticating as the remote support user and submitting malicious input to specific commands. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying filesystem. The attacker has no control over the contents of the data written to the file. Overwriting a critical file could cause the device to crash, resulting in a denial of service condition (DoS). Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-tele-ce-file-ovrwrt
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191016-tele-ce-file-ovrwrt is high due to the potential for arbitrary file overwrites by an authenticated local attacker.
To fix cisco-sa-20191016-tele-ce-file-ovrwrt, ensure that you apply the latest patches and updates provided by Cisco for the TelePresence Collaboration Endpoint.
Exploiting cisco-sa-20191016-tele-ce-file-ovrwrt can lead to unauthorized file modifications which may disrupt the functionality of the affected system.
Cisco TelePresence Collaboration Endpoint Software users are affected by cisco-sa-20191016-tele-ce-file-ovrwrt if they have an unaudited environment allowing for file overwrite vulnerabilities.
No, cisco-sa-20191016-tele-ce-file-ovrwrt requires local authenticated access for an attacker to exploit the vulnerabilities.