CVE-2015-0770
Published Jun 7, 2015
Last updated 8 years ago
Overview
- Description
- CRLF injection vulnerability in Cisco TelePresence TC 6.x before 6.3.4 and 7.x before 7.3.3 on Integrator C SX20 devices allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL, aka Bug ID CSCut79341.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB861F3A-CA8F-493B-B63E-C27007D7A498" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A72D4048-53D6-4B3A-8148-4C7F5354D3EF" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49545BCD-C2F3-46EC-9F77-34639054E46B" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CB8B703-A9BD-4A63-BC62-3F031440B00F" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "873E6F91-E3A8-4B6F-87F0-2FC843A0521F" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ACE9AFC-B520-44A9-90E9-0921AA25FA4D" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "383A9D84-B1CA-42E1-B863-42B7F30A0DE8" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6E1EDB9-0C99-4067-BA23-94EA3225C0D0" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF5B5124-D5AF-46E4-81DF-A63DB4A3141D" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0012942-BB39-42EE-AB7F-46E503140016" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6627DC6B-166F-4DC9-A330-4C6063C3AD9D" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24F58A78-36B5-4CF0-B71D-DF451479F451" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B87019A-1277-483E-AAD1-17A53FAD7121" }, { "criteria": "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3501B65-DF7C-4E58-894A-E0280A68DA62" } ], "operator": "OR" } ] } ]