Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-4510
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-13 Apr, 2010 | 17:30
Updated At-11 Apr, 2025 | 00:51

The SSH service on the TANDBERG Video Communication Server (VCS) before X5.1 uses a fixed DSA key, which makes it easier for remote attackers to conduct man-in-the-middle attacks and spoof arbitrary servers via crafted SSH packets.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.08.5HIGH
AV:N/AC:M/Au:S/C:C/I:C/A:C
CPE Matches

vsecurity
vsecurity
>>tandberg_video_communication_server>>Versions up to x5.0.0(inclusive)
cpe:2.3:a:vsecurity:tandberg_video_communication_server:*:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x1.0.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x1.0.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x1.1.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x1.1.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x1.2.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x1.2.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x2.0.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x2.0.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x2.1.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x2.1.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x3.0.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x3.0.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x3.1.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x3.1.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x4.1.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x4.1.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x4.2.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x4.2.0:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x4.2.1
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x4.2.1:*:*:*:*:*:*:*
vsecurity
vsecurity
>>tandberg_video_communication_server>>x4.3.0
cpe:2.3:a:vsecurity:tandberg_video_communication_server:x4.3.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-310Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://ftp.tandberg.com/pub/software/vcs/TANDBERG%20Video%20Communication%20Server%20Software%20Release%20Notes%20%28X5%29.pdfcve@mitre.org
N/A
http://secunia.com/advisories/39275cve@mitre.org
Vendor Advisory
http://www.vsecurity.com/resources/advisory/20100409-2cve@mitre.org
Patch
Vendor Advisory
http://ftp.tandberg.com/pub/software/vcs/TANDBERG%20Video%20Communication%20Server%20Software%20Release%20Notes%20%28X5%29.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/39275af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vsecurity.com/resources/advisory/20100409-2af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Change History
0Changes found

Details not found