A vulnerability in the image verification function of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with internal user privileges on the underlying operating system. The vulnerability is due to insufficient validation of the content of upgrade packages. An attacker could exploit this vulnerability by uploading a malicious archive to the Upgrade page of the administrative web interface. A successful exploit could allow the attacker to execute code with user-level privileges (the _nobody account) on the underlying operating system.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2021-08-18T19:40:16.322327Z

Updated: 2024-11-07T22:04:07.976Z

Reserved: 2021-06-15T00:00:00

Link: CVE-2021-34715

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:48.135Z

cve-icon NVD

Status : Modified

Published: 2021-08-18T20:15:07.150

Modified: 2024-11-21T06:11:02.033

Link: CVE-2021-34715

cve-icon Redhat

No data.