Cisco TelePresence Video Communication Server up to X8.7.1 Mobile/Remote Access Certificate input validation

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.3 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Cisco TelePresence Video Communication Server up to X8.7.1 and classified as critical. Impacted is an unknown function of the component Mobile/Remote Access. This manipulation as part of Certificate causes input validation. The identification of this vulnerability is CVE-2016-1444. It is possible to initiate the attack remotely. There is no exploit available. The affected component should be upgraded.
Details
A vulnerability was found in Cisco TelePresence Video Communication Server up to X8.7.1 (Unified Communication Software). It has been declared as critical. Affected by this vulnerability is an unknown part of the component Mobile/Remote Access. The manipulation as part of a Certificate leads to a input validation vulnerability. The CWE definition for the vulnerability is CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
The Mobile and Remote Access (MRA) component in Cisco TelePresence Video Communication Server (VCS) X8.1 through X8.7 and Expressway X8.1 through X8.6 mishandles certificates, which allows remote attackers to bypass authentication via an arbitrary trusted certificate, aka Bug ID CSCuz64601.
The weakness was shared 07/07/2016 as CSCuz64601 as not defined advisory (Website). It is possible to read the advisory at tools.cisco.com. This vulnerability is known as CVE-2016-1444 since 01/04/2016. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 92045 (Cisco TelePresence VCS / Expressway 8.x < 8.8 Multiple Vulnerabilities (Bar Mitzvah)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CISCO and running in the context r.
Upgrading eliminates this vulnerability. A possible mitigation has been published before and not just after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (92045) and SecurityFocus (BID 91669†). The entry VDB-79763 is related to this item. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.3
VulDB Base Score: 6.5
VulDB Temp Score: 6.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.5
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 92045
Nessus Name: Cisco TelePresence VCS / Expressway 8.x < 8.8 Multiple Vulnerabilities (Bar Mitzvah)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 860731
OpenVAS Name: Cisco TelePresence Video Communication Server (VCS) Authentication Bypass Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
01/04/2016 🔍07/06/2016 🔍
07/06/2016 🔍
07/07/2016 🔍
07/07/2016 🔍
07/08/2016 🔍
07/14/2016 🔍
09/01/2022 🔍
Sources
Vendor: cisco.comAdvisory: CSCuz64601
Status: Not defined
CVE: CVE-2016-1444 (🔍)
GCVE (CVE): GCVE-0-2016-1444
GCVE (VulDB): GCVE-100-88819
SecurityFocus: 91669 - Cisco Video Communication Server and Expressway CVE-2016-1444 Authentication Bypass Vulnerability
SecurityTracker: 1036237
See also: 🔍
Entry
Created: 07/08/2016 09:50Updated: 09/01/2022 08:00
Changes: 07/08/2016 09:50 (65), 02/18/2019 14:09 (13), 09/01/2022 08:00 (4)
Complete: 🔍
Cache ID: 216:BE1:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.