ID

VAR-201609-0355


CVE

CVE-2016-6377


TITLE

Cisco Virtual Media Packager of Media Origination System Suite Software Vulnerabilities that bypass authentication

Trust: 0.8

sources: JVNDB: JVNDB-2016-004536

DESCRIPTION

Media Origination System Suite Software 2.6 and earlier in Cisco Virtual Media Packager (VMP) allows remote attackers to bypass authentication and make arbitrary Platform and Applications Manager (PAM) API calls via unspecified vectors, aka Bug ID CSCuz52110. Vendors have confirmed this vulnerability Bug ID CSCuz52110 It is released as.Authentication is bypassed by a third party and any Platform and Applications Manager (PAM) API A call may be made. CiscoVirtualMediaPackager is a virtual media packaging device. An unauthorized access vulnerability exists in Cisco VirtualMediaPackager (VMP) versions 2.6 and earlier, allowing attackers to obtain sensitive information. Attackers can exploit this issue to gain unauthorized access to the affected device. This may aid in further attacks. The issue is being tracked by Cisco Bug ID CSCuz52110 . The solution supports media ingestion, recording, storage and distribution, and more

Trust: 2.52

sources: NVD: CVE-2016-6377 // JVNDB: JVNDB-2016-004536 // CNVD: CNVD-2016-07069 // BID: 92715 // VULHUB: VHN-95197

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-07069

AFFECTED PRODUCTS

vendor:ciscomodel:media origination system suitescope:eqversion:2.3\(7\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.3\(8\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.4\(1\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.5\(0\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.3\(2\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.3\(6\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.5_base

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.5\(1\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.6_base

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.3\(1\)

Trust: 1.6

vendor:ciscomodel:media origination system suitescope:eqversion:2.4_base

Trust: 1.0

vendor:ciscomodel:media origination system suitescope:eqversion:2.3_base

Trust: 1.0

vendor:ciscomodel:media origination system suite softwarescope:lteversion:2.6

Trust: 0.8

vendor:ciscomodel:virtual media packagerscope:ltversion:2.6

Trust: 0.6

vendor:ciscomodel:virtual media packagerscope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:virtual media packagerscope:eqversion:2.0

Trust: 0.3

sources: CNVD: CNVD-2016-07069 // BID: 92715 // JVNDB: JVNDB-2016-004536 // CNNVD: CNNVD-201608-536 // NVD: CVE-2016-6377

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6377
value: HIGH

Trust: 1.0

NVD: CVE-2016-6377
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-07069
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201608-536
value: MEDIUM

Trust: 0.6

VULHUB: VHN-95197
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-6377
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-07069
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-95197
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6377
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-07069 // VULHUB: VHN-95197 // JVNDB: JVNDB-2016-004536 // CNNVD: CNNVD-201608-536 // NVD: CVE-2016-6377

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-95197 // JVNDB: JVNDB-2016-004536 // NVD: CVE-2016-6377

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201608-536

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201608-536

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004536

PATCH

title:cisco-sa-20160831-vmpurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-vmp

Trust: 0.8

title:CiscoVirtualMediaPackager does not authorize access to vulnerable patchesurl:https://www.cnvd.org.cn/patchInfo/show/81018

Trust: 0.6

title:Cisco Media Origination System Suite Software Fixes for unauthorized access vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63833

Trust: 0.6

sources: CNVD: CNVD-2016-07069 // JVNDB: JVNDB-2016-004536 // CNNVD: CNNVD-201608-536

EXTERNAL IDS

db:NVDid:CVE-2016-6377

Trust: 3.4

db:BIDid:92715

Trust: 2.6

db:JVNDBid:JVNDB-2016-004536

Trust: 0.8

db:CNNVDid:CNNVD-201608-536

Trust: 0.7

db:CNVDid:CNVD-2016-07069

Trust: 0.6

db:NSFOCUSid:34703

Trust: 0.6

db:VULHUBid:VHN-95197

Trust: 0.1

sources: CNVD: CNVD-2016-07069 // VULHUB: VHN-95197 // BID: 92715 // JVNDB: JVNDB-2016-004536 // CNNVD: CNNVD-201608-536 // NVD: CVE-2016-6377

REFERENCES

url:http://www.securityfocus.com/bid/92715

Trust: 2.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160831-vmp

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6377

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6377

Trust: 0.8

url:http://www.nsfocus.net/vulndb/34703

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-07069 // VULHUB: VHN-95197 // BID: 92715 // JVNDB: JVNDB-2016-004536 // CNNVD: CNNVD-201608-536 // NVD: CVE-2016-6377

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 92715

SOURCES

db:CNVDid:CNVD-2016-07069
db:VULHUBid:VHN-95197
db:BIDid:92715
db:JVNDBid:JVNDB-2016-004536
db:CNNVDid:CNNVD-201608-536
db:NVDid:CVE-2016-6377

LAST UPDATE DATE

2025-04-13T23:35:03.475000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-07069date:2016-09-02T00:00:00
db:VULHUBid:VHN-95197date:2016-11-28T00:00:00
db:BIDid:92715date:2016-08-31T00:00:00
db:JVNDBid:JVNDB-2016-004536date:2016-09-07T00:00:00
db:CNNVDid:CNNVD-201608-536date:2016-09-05T00:00:00
db:NVDid:CVE-2016-6377date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-07069date:2016-09-02T00:00:00
db:VULHUBid:VHN-95197date:2016-09-03T00:00:00
db:BIDid:92715date:2016-08-31T00:00:00
db:JVNDBid:JVNDB-2016-004536date:2016-09-07T00:00:00
db:CNNVDid:CNNVD-201608-536date:2016-08-31T00:00:00
db:NVDid:CVE-2016-6377date:2016-09-03T20:59:08.310