CVE-2011-0354

The default configuration of Cisco Tandberg C Series Endpoints, and Tandberg E and EX Personal Video units, with software before TC4.0.0 has a blank password for the root account, which makes it easier for remote attackers to obtain access via an unspecified login method.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:cisco:tandberg_endpoint:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_endpoint:tc2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_endpoint:tc3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_endpoint:tc3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_endpoint:tc3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_endpoint:tc3.1.2:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:tandberg_endpoint:c20:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_endpoint:c40:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_endpoint:c60:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_endpoint:c90:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:cisco:tandberg_personal_video_unit_software:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_personal_video_unit:ex90:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:cisco:tandberg_personal_video_unit_software:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:te1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:te2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_personal_video_unit:e20:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_personal_video_unit:ex60:*:*:*:*:*:*:*

History

21 Nov 2024, 01:23

Type Values Removed Values Added
References () http://secunia.com/advisories/43158 - Vendor Advisory () http://secunia.com/advisories/43158 - Vendor Advisory
References () http://securityreason.com/securityalert/8060 - () http://securityreason.com/securityalert/8060 -
References () http://securitytracker.com/id?1025017 - () http://securitytracker.com/id?1025017 -
References () http://tools.cisco.com/security/center/viewAlert.x?alertId=22314 - () http://tools.cisco.com/security/center/viewAlert.x?alertId=22314 -
References () http://www.cisco.com/en/US/products/ps11422/products_security_advisory09186a0080b69541.shtml - Vendor Advisory () http://www.cisco.com/en/US/products/ps11422/products_security_advisory09186a0080b69541.shtml - Vendor Advisory
References () http://www.exploit-db.com/exploits/16100 - () http://www.exploit-db.com/exploits/16100 -
References () http://www.kb.cert.org/vuls/id/436854 - US Government Resource () http://www.kb.cert.org/vuls/id/436854 - US Government Resource
References () http://www.securityfocus.com/bid/46107 - () http://www.securityfocus.com/bid/46107 -

Information

Published : 2011-02-03 16:00

Updated : 2024-11-21 01:23


NVD link : CVE-2011-0354

Mitre link : CVE-2011-0354

CVE.ORG link : CVE-2011-0354


JSON object : View

Products Affected

cisco

  • tandberg_endpoint
  • tandberg_personal_video_unit
  • tandberg_personal_video_unit_software
CWE
CWE-255

Credentials Management Errors