A vulnerability in the web-based management interface of VVX, Trio, SoundStructure, SoundPoint, and SoundStation phones running Polycom UC Software, if exploited, could allow an authenticated, remote attacker with admin privileges to cause a denial of service (DoS) condition or execute arbitrary code.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-1.pdf - Vendor Advisory |
Information
Published : 2019-07-29 16:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12948
Mitre link : CVE-2019-12948
CVE.ORG link : CVE-2019-12948
JSON object : View
Products Affected
polycom
- vvx311
- soundpoint_ip_650
- soundpoint_ip_321
- soundstation_ip_7000_video_integration
- soundstation2_direct_connect_for_nortel
- soundpoint_ip_550
- soundstation_duo
- vvx301
- c16
- vvx150
- soundstation_ip_6000
- soundstation_vtx_1000
- c8
- soundpoint_ip_335
- vvx600
- soundpoint_ip_670
- vvx410
- soundstation2
- soundstation_ip_5000
- vvx310
- soundpoint_ip_560
- trio_8500
- vvx350
- soundstation_ip_4000
- soundstation2w
- soundpoint_ip_600
- soundpoint_ip_500
- vvx411
- vvx300
- vvx250
- vvx450
- soundpoint_ip_300
- soundpoint_ip_301
- vvx201
- c12
- vvx601
- soundpoint_ip_320
- soundpoint_pro_se-225
- soundpoint_ip_331
- soundpoint_ip_430
- soundstation_ip_7000
- soundpoint_ip_450
- trio_8800
- soundpoint_ip_330
- soundpoint_ip_501
- unified_communications_software
- soundstation2_avaya_2490
- vvx500
- vvx501
- vvx400
- soundpoint_ip_601
- vvx401
- united_communications_software
- soundpoint_pro_se-220
CWE
CWE-749
Exposed Dangerous Method or Function