MEDIUM · 4.0

CVE-2015-4328

Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS comman...

Vulnerability Description

Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS commands via crafted HTTP requests, as demonstrated by read or write operations on the Unified Communications lookup page, aka Bug ID CSCuv12552.

CVSS Score

4.0

MEDIUM

AV:N/AC:L/Au:S/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
CiscoTelepresence Video Communication Server Softwarex8.5.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4328?

CVE-2015-4328 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS comman...

How severe is CVE-2015-4328?

CVE-2015-4328 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4328?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Telepresence Video Communication Server Software.