First published: Wed Nov 04 2020(Updated: )
A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tele-info-DrEGLpDQ
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-tele-info-DrEGLpDQ is classified as high due to the potential for unauthorized access to sensitive information.
To fix cisco-sa-tele-info-DrEGLpDQ, update your Cisco TelePresence Collaboration Endpoint Software to the latest version provided by Cisco.
cisco-sa-tele-info-DrEGLpDQ is an information disclosure vulnerability affecting the video endpoint API of Cisco TelePresence products.
Users of Cisco TelePresence Collaboration Endpoint Software are affected by the cisco-sa-tele-info-DrEGLpDQ vulnerability.
An attacker exploiting cisco-sa-tele-info-DrEGLpDQ could gain access to sensitive information stored improperly in the affected device.