{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T08:11:15.158","vulnerabilities":[{"cve":{"id":"CVE-2020-3336","sourceIdentifier":"psirt@cisco.com","published":"2020-06-18T03:15:13.667","lastModified":"2024-11-21T05:30:49.650","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the software upgrade process of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software could allow an authenticated, remote attacker to modify the filesystem to cause a denial of service (DoS) or gain privileged access to the root filesystem. The vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending requests with malformed parameters to the system using the console, Secure Shell (SSH), or web API. A successful exploit could allow the attacker to modify the device configuration or cause a DoS."},{"lang":"es","value":"Una vulnerabilidad en el proceso de actualización de software de Cisco TelePresence Collaboration Endpoint Software y Cisco RoomOS Software, podría permitir a un atacante remoto autenticado modificar el sistema de archivos para causar una denegación de servicio (DoS) u conseguir acceso privilegiado al sistema de archivos root. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante con privilegios administrativos podría explotar esta vulnerabilidad mediante el envío de peticiones con parámetros malformados al sistema utilizando la consola, Secure Shell (SSH) o API web. Una explotación con éxito podría permitir a un atacante modificar la configuración del dispositivo o causar una DoS"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:roomos:-:*:*:*:*:*:*:*","matchCriteriaId":"05DD3D37-0932-4F36-88E4-D89F1FED4673"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*","versionEndExcluding":"9.9.4","matchCriteriaId":"08A208DE-7452-4C1C-AE20-074850F875D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*","versionStartIncluding":"9.10.0","versionEndIncluding":"9.10.2","matchCriteriaId":"5C09694B-5448-44A2-BDEC-50E49755E1B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*","versionStartIncluding":"9.12.0","versionEndIncluding":"9.12.3","matchCriteriaId":"54F5F988-25AE-4647-B5FC-61DDC1544C35"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-cmd-inj-7ZpWhvZb","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-cmd-inj-7ZpWhvZb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}