
AV:A/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
-
Cisco TelePresence System Software contains a vulnerability in the System Status Collection Daemon (SSCD) code that could allow an unauthenticated, adjacent attacker to execute arbitrary commands with the privileges of the root user.
Cisco has released software updates that address this vulnerability. No workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140122-cts
-
Vulnerable Products
This vulnerability affects Cisco TelePresence System Software running on the following hardware:
- Cisco TelePresence System 500-32
- Cisco TelePresence System 500-37
- Cisco TelePresence System 1000
- Cisco TelePresence System 1100
- Cisco TelePresence System 1300-65
- Cisco TelePresence System 3000
- Cisco TelePresence System 3010
- Cisco TelePresence System 3200
- Cisco TelePresence System 3210
- Cisco TelePresence System TX1300 47 (Also Known As the TX1300-47)
- Cisco TelePresence System TX1310 65
- Cisco TelePresence System TX9000
- Cisco TelePresence System TX9200
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by this vulnerability.
-
A vulnerability in System Status Collection Daemon (SSCD) code could allow an unauthenticated, adjacent attacker to execute arbitrary commands with the privilege of the root user.
The vulnerability is due to improper validation of parameters passed to the SSCD code via an XML-remote procedure call (RPC). An attacker could exploit this vulnerability by sending crafted XML-RPC messages. An exploit could allow the attacker to execute arbitrary calls via stack corruption with the privilege of the root user.
This vulnerability is documented in Cisco bug ID CSCui32796 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2014-0661.
-
There are no workarounds that mitigate this vulnerability.
-
When considering software upgrades, customers are advised to consult the Cisco Security Advisories, Responses, and Notices archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
The following table provides information about the first fixed release of Cisco TelePresence System Software for each of the affected product:
Product
First Fixed Release
Cisco TelePresence System 500-32 6.0.4(11) or later
Cisco TelePresence System 500-37 1.10.2(42) or later
Cisco TelePresence System 1000 1.10.2(42) or later
Cisco TelePresence System 1300-65 1.10.2(42) or later
Cisco TelePresence System 3000 1.10.2(42) or later
Cisco TelePresence System 3010 1.10.2(42) or later Cisco TelePresence System 3200 1.10.2(42) or later
Cisco TelePresence System 3210 1.10.2(42) or later
Cisco TelePresence System 1300-47 6.0.4(11) or later
Cisco TelePresence System TX1310 65 6.0.4(11) or later Cisco TelePresence System TX9000 6.0.4(11) or later
Cisco TelePresence System TX9200 6.0.4(11) or later
-
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
This vulnerability was found during internal testing.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.0 2014-January-22 Initial public release
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.