Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco TelePresence Video Communication Server Expressway Default SSL Certificate Vulnerability

Cisco-SA-20140123-CVE-2014-0675 · Medium · Published · Updated

A vulnerability in the Cisco TelePresence Video Communication Server (VCS) Expressway could allow an unauthenticated, remote attacker to execute a man-in-the-middle (MITM) attack between one or more affected devices. The vulnerability occurs because the same default SSL certificate is used across all Cisco TelePresence VCS Expressway devices. An attacker could exploit this vulnerability by using the default SSL certificate to intercept, decrypt, read, and write information between one or more of the affected devices. Cisco has confirmed the vulnerability in a security notice and released software updates. It is likely that one or more affected devices that an attacker could attempt to exploit would be placed on trusted, internal networks behind firewall restrictions. An attacker may require access to this network, which may reduce the likelihood of a successful exploit.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators may consider installing a new SSL certificate on affected devices.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-0675
Cisco Bug IDsCSCue07471
CVSS ScoreBase 6.4
Base 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C
Product Names From Source
Cisco TelePresence Video Communication Server (VCS)

Related Products

Product CVE Evidence
Cisco TelePresence Video Communication Server (VCS) Expressway CVE-2014-0675 Cisco OpenVuln
Cisco TelePresence Video Communication Server (VCS) CVE-2014-0675 Cisco OpenVuln
Cisco TelePresence CVE-2014-0675 Cisco OpenVuln