ID

VAR-E-201011-0644


TITLE

Cisco Unified Videoconferencing Password Obfuscation Vulnerability

Trust: 0.3

sources: BID: 44923

DESCRIPTION

Cisco Unified Videoconferencing is prone to a weak-password obfuscation vulnerability.
An attacker can exploit this issue to gain unauthorized access to the affected device.
This issue is being tracked by Cisco bug ID CSCti54010.
The following products are affected:
Cisco Unified Videoconferencing 5110 System
Cisco Unified Videoconferencing 5115 System
Cisco Unified Videoconferencing 5230 System
Cisco Unified Videoconferencing 3545 System
Cisco Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway
Cisco Unified Videoconferencing 3522 Basic Rate Interfaces (BRI) Gateway
Cisco Unified Videoconferencing 3515 Multipoint Control Unit (MCU)
NOTE: This issue was previously discussed in BID 44908 (Cisco Unified Videoconferencing Multiple Vulnerabilities and Weakness) but has been given its own record to better document it.

Trust: 0.3

sources: BID: 44923

AFFECTED PRODUCTS

vendor:ciscomodel:unified videoconferencing systemscope:eqversion:52300

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:eqversion:51150

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:eqversion:51100

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:eqversion:35450

Trust: 0.3

vendor:ciscomodel:unified videoconferencing primary rate interface gatescope:eqversion:35270

Trust: 0.3

vendor:ciscomodel:unified videoconferencing basic rate interfaces gatewscope:eqversion:35220

Trust: 0.3

vendor:ciscomodel:unified videoconferencing multipoint control unitscope:eqversion:35150

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:neversion:52307.1.2.15

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:neversion:51157.1.2.15

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:neversion:51107.1.2.12

Trust: 0.3

vendor:ciscomodel:unified videoconferencing systemscope:neversion:35455.7.2

Trust: 0.3

vendor:ciscomodel:unified videoconferencing primary rate interface gatescope:neversion:35275.7.2

Trust: 0.3

vendor:ciscomodel:unified videoconferencing basic rate interfaces gatewscope:neversion:35225.7.2

Trust: 0.3

vendor:ciscomodel:unified videoconferencing multipoint control unitscope:neversion:35155.7.2

Trust: 0.3

sources: BID: 44923

EXPLOIT

The vendor indicates that exploit code is available to aid in recovering the device's hashed passwords.

Trust: 0.3

sources: BID: 44923

PRICE

Free

Trust: 0.3

sources: BID: 44923

TYPE

Design Error

Trust: 0.3

sources: BID: 44923

CREDITS

Florent Daigniere

Trust: 0.3

sources: BID: 44923

EXTERNAL IDS

db:BIDid:44923

Trust: 0.3

sources: BID: 44923

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sr-20101117-cuvc.shtml

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20101206-cuvc.shtml

Trust: 0.3

url:http://www.cisco.com/en/us/products/hw/video/ps1870/index.html

Trust: 0.3

sources: BID: 44923

SOURCES

db:BIDid:44923

LAST UPDATE DATE

2022-07-27T09:27:58.503000+00:00


SOURCES UPDATE DATE

db:BIDid:44923date:2010-12-06T19:55:00

SOURCES RELEASE DATE

db:BIDid:44923date:2010-11-17T00:00:00