Guest

Preview Tool

Cisco Bug: CSCvv68467 - Multiple Vulnerabilities in VTSR and VTF (212093533)

Last Modified

Sep 18, 2020

Products (1)

  • Cisco Virtual Topology System

Known Affected Releases

2.6(5)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3192 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3192
CVE-2010-4756 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4756
CVE-2013-0222 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222
CVE-2015-5180 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180
CVE-2015-5602 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5602
CVE-2015-8985 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
CVE-2015-9019 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
CVE-2016-10228 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
CVE-2016-10739 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
CVE-2016-1234 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
CVE-2016-1238 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
CVE-2016-1683 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
CVE-2016-1684 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
CVE-2016-2781 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
CVE-2016-4607 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4607
CVE-2016-4609 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4609
CVE-2016-5417 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417
CVE-2016-6185 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
CVE-2016-7076 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076
CVE-2016-9243 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9243
CVE-2016-9840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840
CVE-2017-12132 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
CVE-2017-12837 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837
CVE-2017-12883 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883
CVE-2017-15804 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804
CVE-2017-16548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
CVE-2017-18018 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18018
CVE-2018-1000001 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
CVE-2018-11236 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236
CVE-2018-11237 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237
CVE-2018-18311 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
CVE-2018-18313 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
CVE-2018-19591 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591
CVE-2018-6485 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485
CVE-2018-6797 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797
CVE-2018-6913 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913
CVE-2018-8740 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
CVE-2019-18634 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634
CVE-2019-20367 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367
CVE-2019-20907 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
CVE-2019-5815 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815
CVE-2019-6488 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488
CVE-2019-9169 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
CVE-2020-10543 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
CVE-2020-10878 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
CVE-2020-12049 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
CVE-2020-13631 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
CVE-2020-13632 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632
CVE-2020-14147 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147
CVE-2020-14309 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309
CVE-2020-14422 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422
CVE-2020-15358 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358
CVE-2020-15778 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15778
CVE-2020-1752 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752


After analysis, Cisco has decided against performing additional actions on this product due to one of the 
following reasons: 

- The product is no longer maintained, having reached End of Software Maintenance.  
- The product is still being maintained, but a business decision was made not to upgrade the vulnerable product.  
- The product uses the affected third-party component in such a way as to not be affected by these vulnerabilities.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.