AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
-
Cisco TelePresence Endpoint devices contain the following vulnerabilities:
- Cisco TelePresence API Remote Command Execution Vulnerability
- Cisco TelePresence Remote Command Execution Vulnerability
- Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability
Exploitation of the Remote Command Execution vulnerability could allow an authenticated, remote attacker to inject commands into requests made to the Administrative Web interface. The injected commands will be executed by the underlying operating system in an elevated context.
Exploitation of the Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability may allow an unauthenticated, adjacent attacker to execute arbitrary code with elevated privileges.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that mitigate these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts
-
Enter product information here.
Vulnerable Products
Cisco TelePresence Manager, Cisco TelePresence Recording Server, Cisco TelePresence Multipoint Switch, and Cisco TelePresence Immersive Endpoint System may be affected by the vulnerabilities that are described in this security advisory. The following tables contain specific information for each vulnerability.
Cisco TelePresence API Remote Command Injection Vulnerability
Product Affected Cisco TelePresence Manager
NO Cisco TelePresence Recording Server NO Cisco TelePresence Multipoint Switch NO Cisco TelePresence Immersive Endpoint System YES
Cisco TelePresence Remote Command Injection Vulnerability
Product Affected Cisco TelePresence Manager NO Cisco TelePresence Recording Server NO Cisco TelePresence Multipoint Switch NO Cisco TelePresence Immersive Endpoint System YES
Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability
Product Affected Cisco TelePresence Manager YES Cisco TelePresence Recording Server YES Cisco TelePresence Multipoint Switch YES Cisco TelePresence Immersive Endpoint System YES
Detailed Information about Vulnerable Product
This security advisory is describing the vulnerabilities for the Cisco TelePresence Endpoint devices. For additional information regarding how the vulnerabilities affect other vulnerable products please refer to the specific product security advisory document following the link in the table below:
Product Security Advisory Publication Link Cisco TelePresence Multipoint Switch https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms Cisco TelePresence Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman Cisco TelePresence Recording Server https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs
How To Determine The Software Version
Cisco TelePresence Recording Server devices that are running an affected version of software are affected.
To determine the current version of software that is running on Cisco TelePresence Endpoint Systems, establish an SSH connection to the device and issue the show version active and the show version inactive commands. The output should resemble the following example:
admin: show version active Active Master Version: 1.7.0.0-471 Active Version Installed Software Options: No Installed Software Options Found. admin: show version inactive Inactive Master Version: 1.6.0.0-342 Inactive Version Installed Software Options: No Installed Software Options Found.
In the preceding example, the system has versions 1.6.0 and 1.7.0 loaded on the device, and version 1.7.0 is currently active. A device is affected only by vulnerabilities that are in the active software version.
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities.
-
Cisco TelePresence Endpoint devices provide an immersive remote presence experience.
This section gives additional information for each of the vulnerabilities affecting Cisco TelePresence Immersive Endpoint Devices.
Cisco TelePresence API Remote Command Execution Vulnerability
A remote command injection vulnerability exists in one of the Cisco TelePresence APIs that are hosted on the immersive endpoint devices. This issue if exploited could allow an unauthenticated attacker in an adjacent context to execute arbitrary commands on the underlying operating system with elevated privileges.
An attacker must have the ability to submit a malformed request to TCP port 61460 from a physical or logical Layer 3 adjacent context. A three-way handshake is required to exploit this vulnerability.
This vulnerability is documented in Cisco bug ID CSCtz38382 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2012-3074.
Cisco TelePresence Remote Command Execution Vulnerability
A remote command injection vulnerability exists in the Cisco TelePresence administrative web interface that is hosted on the immersive endpoint devices. If exploited, this issue could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system with elevated privileges.
An attacker must have the ability to submit a malformed request to TCP port 443. A three-way handshake is required to exploit this vulnerability.
This vulnerability is documented in Cisco bug ID CSCtn99724 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2012-3075.
Cisco TelePresence Cisco Discovery Protocol Remote Code Execution Vulnerability
A remote code execution vulnerability in the implementation of the Cisco Discovery Protocol component could allow an unauthenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerability is due to a failure to properly handle malformed Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by passing malformed Cisco Discovery Protocol packets to an affected device. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code with elevated privileges.
Because Cisco Discovery Protocol works at the data link layer (Layer 2), an attacker must have a way to submit an Ethernet frame directly to an affected device. This action may be possible in situations where the affected system is part of a bridged network or connected to a non partitioned device, such as a network hub.
This vulnerability is documented in Cisco bug ID CSCtz40953 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2012-2486.
-
There are no workarounds that mitigate these vulnerabilities.
-
This section gives details about affected releases and remediation for each of the vulnerabilities affecting Cisco TelePresence Immersive Endpoint Systems.
Cisco TelePresence API Remote Command Execution VulnerabilityVersion First Fixed Release Prior to 1.6
1.8.4 or 1.9.1 1.6
1.8.4 or 1.9.1 1.7
1.8.4 or 1.9.1 1.8
1.8.4 or 1.9.1
Cisco TelePresence Remote Command Execution Vulnerability
Version First Fixed Release Prior to 1.6
1.7.4 1.6
1.7.4 1.7 1.7.4 1.7.4 and later
Not affected 1.8
Not affected
Cisco TelePresence Cisco Discovery Protocol Remote Code Execution VulnerabilityVersion First Fixed Release Prior to 1.6
1.8.4 or 1.9.1
1.6
1.8.4 or 1.9.1 1.7
1.8.4 or 1.9.1 1.8
1.8.4 or 1.9.1 Recommended Releases
The following table gives information about the releases that contains the fixes for all the vulnerabilities described in this security advisory:Version Release Prior to 1.6
Upgrade to 1.9.1 or later
1.6
Upgrade to 1.9.1 or later
1.7
Upgrade to 1.9.1 or later
1.8
Upgrade to 1.8.4 or upgrade to 1.9.1 or later
When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
-
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
These vulnerabilities were discovered during an internal security audit of the Cisco TelePresence Endpoints.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.1 2012-September-24 Cisco has released software version 1.8.4, which remediates the following CVEs in the 1.8.x Train:CVE-2012-2486, CVE-2012-3074, and CVE-2012-3075 Revision 1.0 2012-July-11 Initial public release.
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.