Guest

Preview Tool

Cisco Bug: CSCvv35085 - Multiple vulnerability in VTSR and VTF projects

Last Modified

Aug 19, 2020

Products (1)

  • Cisco Virtual Topology System

Known Affected Releases

2.6(5)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3192 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3192
CVE-2010-4226 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4226
CVE-2010-4756 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4756
CVE-2012-6702 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
CVE-2013-1753 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753
CVE-2015-3717 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3717
CVE-2015-5180 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180
CVE-2015-8239 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239
CVE-2015-8948 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
CVE-2015-9019 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
CVE-2016-1000111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111
CVE-2016-1234 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
CVE-2016-4429 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
CVE-2016-4607 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4607
CVE-2016-4609 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4609
CVE-2016-7415 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
CVE-2019-20633 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20633
CVE-2019-20795 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20795
CVE-2019-20907 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
CVE-2020-10029 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
CVE-2020-10108 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10108
CVE-2020-10109 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10109
CVE-2020-10531 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531
CVE-2020-10543 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
CVE-2020-10878 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
CVE-2020-11655 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655
CVE-2020-12049 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
CVE-2020-12059 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12059
CVE-2020-12723 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
CVE-2020-13434 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434
CVE-2020-13435 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
CVE-2020-13630 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630
CVE-2020-13631 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
CVE-2020-13632 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632
CVE-2020-13776 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13776
CVE-2020-14147 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147
CVE-2020-14309 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309
CVE-2020-14422 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422
CVE-2020-15358 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358
CVE-2020-15778 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15778
CVE-2020-1712 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712
CVE-2020-1751 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
CVE-2020-1752 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
CVE-2020-3810 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3810
CVE-2020-6096 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.