ID

VAR-201508-0485


CVE

CVE-2015-4316


TITLE

Cisco TelePresence Video Communication Server Expressway of Mobile and Remote Access Vulnerable to spoofing attacks in the endpoint verification function

Trust: 0.8

sources: JVNDB: JVNDB-2015-004344

DESCRIPTION

The Mobile and Remote Access (MRA) endpoint-validation feature in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly validates the phone line used for registration, which allows remote authenticated users to conduct impersonation attacks via a crafted registration, aka Bug ID CSCuv40396. Vendors have confirmed this vulnerability Bug ID CSCuv40396 It is released as.Cleverly crafted registration by remotely authenticated users (registration) May be able to carry out spoofing attacks. Cisco TelePresence Video Communication Server Expressway is prone to an unauthorized-access vulnerability. Attackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks. This issue is being tracked by Cisco bug ID CSCuv40396. The vulnerability is caused by the program not correctly verifying the registered phone line. A remote attacker could exploit this vulnerability by sending a specially crafted Session Initiation Protocol (SIP) message to register the phone and impersonate a legitimate user

Trust: 1.98

sources: NVD: CVE-2015-4316 // JVNDB: JVNDB-2015-004344 // BID: 76353 // VULHUB: VHN-82277

AFFECTED PRODUCTS

vendor:ciscomodel:telepresence video communication server softwarescope:eqversion:x8.5.2

Trust: 1.6

vendor:ciscomodel:telepresence video communication server softwarescope:eqversion:x8.5.2 (vcs expressway)

Trust: 0.8

vendor:ciscomodel:telepresence video communication server expresswayscope:eqversion:x8.5.2

Trust: 0.3

sources: BID: 76353 // JVNDB: JVNDB-2015-004344 // CNNVD: CNNVD-201508-369 // NVD: CVE-2015-4316

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4316
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-4316
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201508-369
value: MEDIUM

Trust: 0.6

VULHUB: VHN-82277
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4316
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-82277
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-82277 // JVNDB: JVNDB-2015-004344 // CNNVD: CNNVD-201508-369 // NVD: CVE-2015-4316

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-82277 // JVNDB: JVNDB-2015-004344 // NVD: CVE-2015-4316

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201508-369

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201508-369

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004344

PATCH

title:40445url:http://tools.cisco.com/security/center/viewAlert.x?alertId=40445

Trust: 0.8

sources: JVNDB: JVNDB-2015-004344

EXTERNAL IDS

db:NVDid:CVE-2015-4316

Trust: 2.8

db:BIDid:76353

Trust: 2.0

db:SECTRACKid:1033282

Trust: 1.1

db:JVNDBid:JVNDB-2015-004344

Trust: 0.8

db:CNNVDid:CNNVD-201508-369

Trust: 0.7

db:VULHUBid:VHN-82277

Trust: 0.1

sources: VULHUB: VHN-82277 // BID: 76353 // JVNDB: JVNDB-2015-004344 // CNNVD: CNNVD-201508-369 // NVD: CVE-2015-4316

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40445

Trust: 2.0

url:http://www.securityfocus.com/bid/76353

Trust: 1.7

url:http://www.securitytracker.com/id/1033282

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4316

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4316

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-82277 // BID: 76353 // JVNDB: JVNDB-2015-004344 // CNNVD: CNNVD-201508-369 // NVD: CVE-2015-4316

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 76353

SOURCES

db:VULHUBid:VHN-82277
db:BIDid:76353
db:JVNDBid:JVNDB-2015-004344
db:CNNVDid:CNNVD-201508-369
db:NVDid:CVE-2015-4316

LAST UPDATE DATE

2024-11-23T22:31:07.271000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-82277date:2017-09-21T00:00:00
db:BIDid:76353date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004344date:2015-08-25T00:00:00
db:CNNVDid:CNNVD-201508-369date:2015-08-21T00:00:00
db:NVDid:CVE-2015-4316date:2024-11-21T02:30:49.143

SOURCES RELEASE DATE

db:VULHUBid:VHN-82277date:2015-08-20T00:00:00
db:BIDid:76353date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004344date:2015-08-25T00:00:00
db:CNNVDid:CNNVD-201508-369date:2015-08-18T00:00:00
db:NVDid:CVE-2015-4316date:2015-08-20T10:59:07.903