Vulnerability Description
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS commands via crafted HTTP requests, as demonstrated by read or write operations on the Unified Communications lookup page, aka Bug ID CSCuv12552.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Telepresence Video Communication Server Software | x8.5.2 |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/viewAlert.x?alertId=40522Vendor Advisory
- http://www.securityfocus.com/bid/76399Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033329Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/viewAlert.x?alertId=40522Vendor Advisory
- http://www.securityfocus.com/bid/76399Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033329Third Party AdvisoryVDB Entry
FAQ
What is CVE-2015-4328?
CVE-2015-4328 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly checks for a user account's read-only attribute, which allows remote authenticated users to execute arbitrary OS comman...
How severe is CVE-2015-4328?
CVE-2015-4328 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4328?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Telepresence Video Communication Server Software.