A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-cmd-inj-7ZpWhvZb - Vendor Advisory |
Information
Published : 2020-06-18 03:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3336
Mitre link : CVE-2020-3336
CVE.ORG link : CVE-2020-3336
JSON object : View
Products Affected
cisco
- roomos
- telepresence_collaboration_endpoint
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')