Menu
Cisco patch stops attackers from taking over TelePresence systems

Cisco patch stops attackers from taking over TelePresence systems

Flaws were also patched in Cisco FirePOWER and Adaptive Security Appliance devices

Cisco Systems has fixed a critical vulnerability that could allow attackers to take over TelePresence systems,  and patched other high-severity flaws in Cisco FirePOWER and Adaptive Security Appliance devices.

The TelePresence software vulnerability stems from an improper authentication mechanism for the XML application programming interface (API). Attackers could exploit it by sending crafted HTTP requests to the XML API in order to bypass authentication and execute unauthorized configuration changes and commands on the system.

The vulnerability is present in the TelePresence Codec (TC) and Collaboration Endpoint (CE) software. The affected devices are: TelePresence EX Series, TelePresence Integrator C Series, TelePresence MX Series, TelePresence Profile Series, TelePresence SX Series, TelePresence SX Quick Set Series, TelePresence VX Clinical Assistant and TelePresence VX Tactical.

Users who can't immediately install the software updates can disable the XML API to mitigate this flaw, but doing so will make it impossible to manage the systems through the Cisco TelePresence Management Suite (TMS).

Otherwise, a high severity denial-of-service vulnerability was patched in the Cisco FirePOWER System Software. By exploiting the flaw, attackers could cause an affected system to stop inspecting and processing packets.

The affected products are: Cisco FirePOWER 7000 Series Appliances, Cisco FirePOWER 8000 Series Appliances, Cisco Advanced Malware Protection (AMP) for Networks running on Cisco FirePOWER 7000 Series Appliances and Cisco Advanced Malware Protection (AMP) for Networks running on Cisco FirePOWER 8000 Series Appliances.

Another denial-of-service flaw was patched in the Firepower System Software for the Adaptive Security Appliance (ASA) 5585-X FirePOWER Security Services Processor (SSP) module. By exploiting the flaw attackers could cause the Cisco FirePOWER module to cease inspecting traffic or to stop responding.

In addition to these patches, Cisco is investigating which of its products are affected by the six vulnerabilities patched this week in the OpenSSL library. The company will update its corresponding advisory when more information or patches for the affected products become available.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

Meet the leading HP partners in New Zealand...

Meet the leading HP partners in New Zealand...

HP has recognised its top performing partners in New Zealand at the second annual 2016 HP Partner Awards, held at a glittering bash in Auckland. The HP Partner Awards recognises and celebrates excellence, growth, consistency and engagement of its top partners. This year also saw the addition of several new categories, resulting in 11 companies winning across 11 award categories.

Meet the leading HP partners in New Zealand...
Channel comes together as Ingram Micro Showcase hits Auckland

Channel comes together as Ingram Micro Showcase hits Auckland

Ingram Micro outlined its core focuses for 2017 at Showcase in Auckland, bringing together the channel for a day of engaging keynotes, compelling breakout sessions and new technologies.

Channel comes together as Ingram Micro Showcase hits Auckland
Show Comments