cisco telepresence-video-communication-server CVE-2018-15430 is a vulnerability in Cisco Telepresence Video Communication Server
Published on October 5, 2018

Cisco Expressway Series and Cisco TelePresence Video Communication Server Remote Code Execution Vulnerability
A vulnerability in the administrative web interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with user-level privileges on the underlying operating system. The vulnerability is due to insufficient validation of the content of upgrade packages. An attacker could exploit this vulnerability by uploading a malicious archive to the Upgrade page of the administrative web interface. A successful exploit could allow the attacker to execute code with user-level privileges on the underlying operating system.

Vendor Advisory NVD

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2018-15430

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-15430 are published in Cisco Telepresence Video Communication Server:

 

Affected Versions

Cisco TelePresence Video Communication Server (VCS) Version n/a is affected by CVE-2018-15430

Exploit Probability

EPSS
1.58%
Percentile
81.30%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.