Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534."}, {"lang": "es", "value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x, v1.6.x, y v1.7.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del proceso) a trav\u00e9s de una solicitud manipulada, tambi\u00e9n conocido como error ID CSCtj44534."}], "id": "CVE-2011-0390", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-02-25T12:00:19.010", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"}, {"source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/46520"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id?1025113"}, {"source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46520"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}