Cisco TelePresence VCS Expressway 8.5.1 / 8.5.2 request-xconfdump Symbolic Link Local File Manipulation (cisco-sa-20141007-vcs)

critical Nessus Plugin ID 86544

Synopsis

The remote host is affected by a file manipulation vulnerability.

Description

According to its self-reported version, the instance of Cisco TelePresence Video Communication Server (VCS) Expressway running on the remote host is affected by a file manipulation vulnerability in request-xconfdump due to insufficient protection of files. An authenticated, local attacker can exploit this, via a malicious symbolic link to an unauthorized location, to insert arbitrary content into arbitrary linked files.

Solution

Upgrade to Cisco TelePresence VCS Expressway 8.6 or later.

See Also

http://www.nessus.org/u?14555317

https://tools.cisco.com/bugsearch/bug/CSCuv11969

Plugin Details

Severity: Critical

ID: 86544

File Name: cisco_telepresence_vcs_sa_20151007.nasl

Version: 1.8

Type: remote

Family: CISCO

Published: 10/22/2015

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-6318

CVSS v3

Risk Factor: Critical

Base Score: 9.3

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/h:cisco:telepresence_video_communication_server, cpe:/a:cisco:telepresence_video_communication_server, cpe:/a:cisco:telepresence_video_communication_server_software

Required KB Items: Cisco/TelePresence_VCS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/7/2015

Vulnerability Publication Date: 10/7/2015

Reference Information

CVE: CVE-2015-6318

BID: 77056

CISCO-SA: cisco-sa-20141007-vcs

CISCO-BUG-ID: CSCuv11969