Risk | High |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-1444 |
CWE-ID | CWE-287 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Cisco TelePresence Video Communication Server Server applications / Other server solutions |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU107
Risk: High
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-1444
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due tolack of proper input validation of a trusted certificate. A remote unauthenticated attacker can bypass authentication and access internal HTTP system resources by connecting to the targeted device with a trusted certificate.
Successful exploitation of this vulnerability may result in disclosure of system information.
Patch for this vulnerability is avaliable through the Cisco Bug Search Tool.
Vulnerable software versionsCisco TelePresence Video Communication Server: X8.1
CPE2.3 External linkshttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-vcs
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.