Cisco

Unified Videoconferencing System 5110

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 22.11.2010 20:00:04
  • Last modified 11.04.2025 00:51:21

/opt/rv/Versions/CurrentVersion/Mcu/Config/Mcu.val in Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, uses a weak hashing algorithm for the (1) administrator and (2) operator passwords, which makes...

  • EPSS 0.05%
  • Published 22.11.2010 20:00:04
  • Last modified 11.04.2025 00:51:21

Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, uses world-readable permissions for the /etc/shadow file, which allows local users to discover encrypted passwords by reading this file, aka Bug ID C...

  • EPSS 0.25%
  • Published 22.11.2010 20:00:04
  • Last modified 11.04.2025 00:51:21

The web interface in Cisco Unified Videoconferencing (UVC) System 3545, 5110, 5115, and 5230; Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway; Unified Videoconferencing 3522 Basic Rate Interfaces (BRI) Gateway; and Unified Videoco...

  • EPSS 0.26%
  • Published 22.11.2010 20:00:04
  • Last modified 11.04.2025 00:51:21

Cisco Unified Videoconferencing (UVC) System 3545, 5110, 5115, and 5230; Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway; Unified Videoconferencing 3522 Basic Rate Interfaces (BRI) Gateway; and Unified Videoconferencing 3515 Multi...

  • EPSS 2.3%
  • Published 22.11.2010 20:00:03
  • Last modified 11.04.2025 00:51:21

goform/websXMLAdminRequestCgi.cgi in Cisco Unified Videoconferencing (UVC) System 5110 and 5115, and possibly Unified Videoconferencing System 3545 and 5230, Unified Videoconferencing 3527 Primary Rate Interface (PRI) Gateway, Unified Videoconferenci...

  • EPSS 1.73%
  • Published 22.11.2010 20:00:03
  • Last modified 11.04.2025 00:51:21

Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, has a default password for the (1) root, (2) cs, and (3) develop accounts, which makes it easier for remote attackers to obtain access via the (a) FT...