First published: Wed Nov 06 2019(Updated: )
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE), Cisco TelePresence Codec (TC), and Cisco RoomOS Software could allow an authenticated, remote attacker to escalate privileges to an unrestricted user of the restricted shell. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including specific arguments when opening an SSH connection to an affected device. A successful exploit could allow the attacker to gain unrestricted user access to the restricted shell of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc
Credit: This vulnerability was found by KO Cisco ASIG during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | ||
Cisco TelePresence Codec | ||
Cisco RoomOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191106-telepres-roomos-privesc is considered high due to the potential for privilege escalation.
To fix cisco-sa-20191106-telepres-roomos-privesc, update the affected Cisco TelePresence Collaboration Endpoint, Codec, or RoomOS Software to the latest version provided by Cisco.
The systems affected by cisco-sa-20191106-telepres-roomos-privesc include Cisco TelePresence Collaboration Endpoint, Cisco TelePresence Codec, and Cisco RoomOS Software.
Authenticated remote attackers are vulnerable to cisco-sa-20191106-telepres-roomos-privesc as they could escalate their privileges.
cisco-sa-20191106-telepres-roomos-privesc is a privilege escalation vulnerability affecting the command-line interface (CLI) of listed Cisco products.