Vulnslist

find the latest Cisco vulnerabilities

Cisco TelePresence Video Communication Server Expressway File Modification Vulnerability

cisco-sa-20151007-vcs · Medium · Published · Updated

A vulnerability in the symbolic link operation of the Cisco TelePresence Video Communication Server (VCS) Expressway could allow an authenticated, local attacker to perform a symbolic link attack on the affected system. The vulnerability is due to insufficient protection of files. An attacker could exploit this vulnerability by creating a malicious symbolic link to a location not otherwise accessible to the attacker. An exploit could allow the attacker to insert unauthorized content in the linked-to file. Cisco has released software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151007-vcs

Cisco advisory · CSAF JSON

Workarounds

Workarounds are not available.

CVEsCVE-2015-6318
Cisco Bug IDsCSCuv11969
CVSS ScoreBase 4.4
Base 4.4 AV:L/AC:M/Au:S/C:N/I:C/A:N/E:POC/RL:OF/RC:C
Product Names From Source
Cisco TelePresence Video Communication Server (VCS) Expressway

Related Products

Product CVE Evidence
Cisco TelePresence Video Communication Server (VCS) Expressway CVE-2015-6318 Cisco OpenVuln
Cisco TelePresence Video Communication Server (VCS) CVE-2015-6318 Cisco OpenVuln
Cisco TelePresence CVE-2015-6318 Cisco OpenVuln