Vulnslist

find the latest Cisco vulnerabilities

Cisco Video Communication Server and Expressway Trusted Certificate Authentication Bypass Vulnerability

cisco-sa-20160706-vcs · Medium · Published · Updated

A vulnerability in certificate management and validation for the Mobile and Remote Access (MRA) feature for Cisco Expressway Series and TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to bypass authentication and access internal HTTP system resources. The vulnerability is due to lack of proper input validation of a trusted certificate. An attacker could exploit this vulnerability by connecting to the targeted device with a trusted certificate. An exploit could allow the attacker to bypass authentication and access internal HTTP system resources. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-vcs

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-1444
Cisco Bug IDsCSCuz64601
CVSS ScoreBase 5.8
Base 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C
Product Names From Source
Cisco TelePresence Video Communication Server (VCS), Cisco TelePresence Video Communication Server (VCS) Expressway

Related Products

Product CVE Evidence
Cisco TelePresence Video Communication Server (VCS) Expressway CVE-2016-1444 Cisco OpenVuln
Cisco TelePresence Video Communication Server (VCS) CVE-2016-1444 Cisco OpenVuln
Cisco TelePresence CVE-2016-1444 Cisco OpenVuln
Cisco Expressway CVE-2016-1444 Cisco OpenVuln