First published: Wed May 04 2022(Updated: )
Multiple vulnerabilities in the web engine of Cisco Telepresence CE Software and RoomOS Software could allow a remote attacker to cause a denial of service (DoS) condition, redirect users to an attacker controlled destination or view sensitive data on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | =10<10.8.2.5>=Earlier than 9<=9<9.15.0.11 | 10.8.2.5 9.15.0.11 |
Cisco RoomOS | =Earlier than RoomOS May 2021<RoomOS May 2021 | RoomOS May 2021 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ROS-DOS-X7H7XhkK is critical due to the potential for denial of service and exposure of sensitive data.
To fix cisco-sa-ROS-DOS-X7H7XhkK, upgrade to Cisco TelePresence CE Software version 10.8.2.5 or later, or RoomOS May 2021 or later.
cisco-sa-ROS-DOS-X7H7XhkK addresses multiple vulnerabilities in the web engine of Cisco Telepresence CE Software and RoomOS Software.
Users of Cisco TelePresence CE Software versions earlier than 10.8.2.5 and RoomOS Software versions prior to May 2021 are affected by cisco-sa-ROS-DOS-X7H7XhkK.
Yes, a remote attacker can exploit cisco-sa-ROS-DOS-X7H7XhkK to cause denial of service, redirect users, or access sensitive information.