7.8
CVE-2019-15289
- EPSS 0.56%
- Veröffentlicht 23.09.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 04:28:23
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
Multiple vulnerabilities in the video service of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by sending crafted traffic to the video service of an affected endpoint. A successful exploit could allow the attacker to cause the video service to crash, resulting in a DoS condition on an affected device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Roomos Version-
Cisco ≫ Webex Board 55 Version-
Cisco ≫ Webex Board 55s Version-
Cisco ≫ Webex Board 70 Version-
Cisco ≫ Webex Board 70s Version-
Cisco ≫ Webex Board 85s Version-
Cisco ≫ Webex Board 55s Version-
Cisco ≫ Webex Board 70 Version-
Cisco ≫ Webex Board 70s Version-
Cisco ≫ Webex Board 85s Version-
Cisco ≫ Telepresence Collaboration Endpoint Version < 9.8.0
Cisco ≫ Webex Board 55 Version-
Cisco ≫ Webex Board 55s Version-
Cisco ≫ Webex Board 70 Version-
Cisco ≫ Webex Board 70s Version-
Cisco ≫ Webex Board 85s Version-
Cisco ≫ Webex Board 55s Version-
Cisco ≫ Webex Board 70 Version-
Cisco ≫ Webex Board 70s Version-
Cisco ≫ Webex Board 85s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.56% | 0.657 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
psirt@cisco.com | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.