Identifying and Mitigating Exploitation of Multiple Vulnerabilities in Cisco TelePresence Products