Cisco TelePresence XML API HTTP Request Handling Authentication Bypass (cisco-sa-20160504-tpxml)

critical Nessus Plugin ID 91130

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is running a version of Cisco TelePresence Codec (TC) that is 7.2.x prior to 7.3.6 or a version of Cisco Collaboration Endpoint (CE) software that is 8.x prior 8.1.1. It is, therefore, affected by an authentication bypass vulnerability in the XML application programming interface (API) of Cisco TC or Cisco CE due to improper implementation of authentication mechanisms for the XML API.
An unauthenticated, remote attacker can exploit this, via a crafted HTTP request to the XML API, to bypass authentication and perform unauthorized configuration changes or issue control commands.

Solution

Upgrade to Cisco TelePresence Codec (TC) version 7.3.6 or Cisco Collaboration Endpoint (CE) version 8.1.1. Alternatively, apply the workaround referenced in the vendor advisory.

See Also

http://www.nessus.org/u?a4e80bb3

Plugin Details

Severity: Critical

ID: 91130

File Name: cisco-sa-20160504-tpxml.nasl

Version: 1.6

Type: remote

Family: CISCO

Published: 5/13/2016

Updated: 11/19/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

CVSS Score Source: CVE-2016-1387

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:telepresence_tc_software, x-cpe:/a:cisco:telepresence_ce_software

Required KB Items: Cisco/TelePresence_MCU/Device, Cisco/TelePresence_MCU/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 5/4/2016

Vulnerability Publication Date: 5/4/2016

Reference Information

CVE: CVE-2016-1387

CISCO-SA: cisco-sa-20160504-tpxml

CISCO-BUG-ID: CSCuz26935