First published: Wed Nov 06 2019(Updated: )
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, local attacker to enable audio recording without notifying users. The vulnerability is due to the presence of unnecessary debug commands. An attacker could exploit this vulnerability by gaining unrestricted access to the restricted shell and using the specific debug commands. A successful exploit could allow the attacker to enable the microphone of an affected device to record audio without notifying users. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telece-ros-eve
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | ||
Cisco RoomOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191106-telece-ros-eve is considered medium.
To fix cisco-sa-20191106-telece-ros-eve, ensure that you apply the available patches or update your Cisco TelePresence Collaboration Endpoint or Cisco RoomOS Software to a fixed version.
Users of Cisco TelePresence Collaboration Endpoint and Cisco RoomOS Software are affected by cisco-sa-20191106-telece-ros-eve.
An authenticated, local attacker can exploit cisco-sa-20191106-telece-ros-eve.
The vulnerability in cisco-sa-20191106-telece-ros-eve allows unauthorized audio recording due to unnecessary debug commands in the CLI.