Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation Vulnerability

cisco-sa-20191106-telepres-roomos-privesc · High · Published · Updated

A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE), Cisco TelePresence Codec (TC), and Cisco RoomOS Software could allow an authenticated, remote attacker to escalate privileges to an unrestricted user of the restricted shell. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including specific arguments when opening an SSH connection to an affected device. A successful exploit could allow the attacker to gain unrestricted user access to the restricted shell of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

For environments where SSH is not utilized for device management, SSH can be disabled to mitigate exploitation of this vulnerability. Refer to the Administration Guide for the specific Endpoint for instructions on disabling SSH.

CVEsCVE-2019-15288
Cisco Bug IDsCSCvq29901
CVSS ScoreBase 8.8
Base 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco TelePresence TC Software, Cisco TelePresence CE Software, Cisco RoomOS Software

Related Products

Product CVE Evidence
Cisco TelePresence TC Software CVE-2019-15288 Cisco OpenVuln
Cisco TelePresence CE Software CVE-2019-15288 Cisco OpenVuln
Cisco TelePresence CVE-2019-15288 Cisco OpenVuln
Cisco RoomOS Software CVE-2019-15288 Cisco OpenVuln