Guest

Preview Tool

Cisco Bug: CSCvv68539 - Multiple Vulnerabilities in VTSR and VTF (212093533)

Last Modified

Sep 18, 2020

Products (1)

  • Cisco Virtual Topology System

Known Affected Releases

2.6(5)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2016-10713 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713
CVE-2016-6313 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
CVE-2016-8619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
CVE-2016-8623 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
CVE-2016-8624 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
CVE-2016-8625 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
CVE-2017-1000082 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082
CVE-2017-1000101 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
CVE-2017-12448 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12448
CVE-2017-12450 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12450
CVE-2017-12451 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451
CVE-2017-12452 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452
CVE-2017-12453 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453
CVE-2017-12454 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454
CVE-2017-12455 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455
CVE-2017-12456 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456
CVE-2017-15396 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15396
CVE-2017-15422 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15422
CVE-2017-18078 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18078
CVE-2018-0495 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495
CVE-2018-1000876 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
CVE-2018-1049 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049
CVE-2018-1084 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1084
CVE-2018-14036 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036
CVE-2018-15688 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688
CVE-2018-16846 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846
CVE-2018-16864 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864
CVE-2018-16865 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865
CVE-2018-16866 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866
CVE-2018-16877 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16877
CVE-2018-16878 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16878
CVE-2018-16889 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889
CVE-2018-19931 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
CVE-2018-20505 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505
CVE-2018-20852 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852
CVE-2018-20969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969
CVE-2018-3817 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3817
CVE-2018-6951 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
CVE-2018-6952 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
CVE-2018-6954 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
CVE-2019-1010204 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
CVE-2019-11454 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11454
CVE-2019-11455 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11455
CVE-2019-12749 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
CVE-2019-12855 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12855
CVE-2019-13636 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13636
CVE-2019-18348 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
CVE-2019-20386 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
CVE-2019-20633 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20633
CVE-2019-3843 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
CVE-2019-3885 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3885
CVE-2019-5482 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
CVE-2019-7612 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7612
CVE-2019-9948 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948
CVE-2020-13776 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13776


After analysis, Cisco has decided against performing additional actions on this product due to one of the 
following reasons: 

- The product is no longer maintained, having reached End of Software Maintenance.  
- The product is still being maintained, but a business decision was made not to upgrade the vulnerable product.  
- The product uses the affected third-party component in such a way as to not be affected by these vulnerabilities.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.