- CISCO RECEIVER D9854 SERIAL
- CISCO RECEIVER D9854 SOFTWARE
- CISCO RECEIVER D9854 SERIES
- CISCO RECEIVER D9854 WINDOWS
NOTE: the following list includes Cisco applications that are intended to be installed on a customer-provided host (either a physical server or a virtual machine) with a customer-installed operating systems.
CISCO RECEIVER D9854 SERIES
CISCO RECEIVER D9854 WINDOWS
Cisco Video Surveillance 6000 Series IP Cameras.Cisco Video Surveillance 4300E/4500E High-Definition IP Cameras.Cisco Video Surveillance 4000 Series IP Cameras.Cisco Video Surveillance 3000 Series IP Cameras.Cisco Video Distribution Suite for Internet Streaming VDS-IS.
CISCO RECEIVER D9854 SOFTWARE
Cisco Universal Small Cell 7000 Series running V3.4.2.x software.Cisco Universal Small Cell 5000 Series running V3.4.2.x software.Cisco Unified Presence Server (Cisco UPS),.Cisco Unified Communications Manager Session Management Edition (SME).Cisco Unified Communications Manager (UCM) 10.0.Cisco Unified Communications Domain Manager (Cisco Unified CDM) 10.1(1).Cisco TelePresence Video Communication Server (VCS).Cisco TelePresence TX 9000 Series Version 6.1.2.0 and prior.Cisco TelePresence Supervisor MSE 8050.Cisco TelePresence System 3000 Series.Cisco TelePresence Server on Virtual Machine.Cisco TelePresence Server on Multiparty Media 310, 320.
CISCO RECEIVER D9854 SERIAL
An exploit could allow the attacker to disclose a limited portion of memory from a connected client or server for every heartbeat packet sent. An exploit could send a specially crafted TLS or DTLS heartbeat packet to the connected client or server. An attacker could exploit this vulnerability by implementing a malicious TLS or Datagram Transport Layer Security (DTLS) client, if trying to exploit the vulnerability on an affected server, or a malicious TLS or DTLS server, if trying to exploit the vulnerability on an affected client. The vulnerability is due to a missing bounds check in the handling of the Transport Layer Security (TLS) heartbeat extension. Multiple Cisco products incorporate a version of the OpenSSL package affected by a vulnerability that could allow an unauthenticated, remote attacker to retrieve memory in chunks of 64 kilobytes from a connected client or server.