First published: Wed Oct 16 2019(Updated: )
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as the remote support user and submitting malicious input to a specific command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system (OS) with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-tele-ce-privescal
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in Cisco TelePresence Collaboration Endpoint has a high severity rating due to the potential for root command execution.
Cisco TelePresence Collaboration Endpoint Software is affected by the vulnerability outlined in Cisco Security Advisory cisco-sa-20191016-tele-ce-privescal.
To mitigate the vulnerability in Cisco Security Advisory cisco-sa-20191016-tele-ce-privescal, ensure that you update to a fixed release of the Cisco TelePresence Collaboration Endpoint Software.
An authenticated, local attacker can exploit the vulnerability as described in Cisco Security Advisory cisco-sa-20191016-tele-ce-privescal.
The vulnerability allows an attacker to execute arbitrary commands with root privileges on the affected device.