Cisco slipped out four security advisories on Friday warning of serious vulnerabilities in its high-end videoconferencing system – or TelePresence, as it prefers to call it. The flaws affect versions of Cisco TelePresence Manager, Recording Server, Immersive Endpoint System, and Multipoint Switch, and would variously allow an …
only solution is VLAN and a MUCH more expensive router supporting permissions
What... did Cisco just want to sell more expensive kit (twice) that can make up for it's softwares shortcomings?
Actually, Cisco does now offer a free client for download at http://www.ciscojabbervideo.com
It's available for both MAC and PC, uses pretty much any webcam, and supports basic point-to-point calls without the need for any additional infrastructure. It can also call in to Telepresence systems via a Cisco VCS ExpressWay. Disclaimer: I work for Cisco :)
Hahaha, and that site is broken
I clicked "Get Jabber Video" and got:
The page you requested has expired.
Return to home page
Apparently they get pissy if you block cookies. Pretty much sums up most of my experience with Cisco products.
All 5 people using Cisco Telepresence gear have been notified.
Re: Roger that
Take your head out of the sand much?
HP said the same thing about Cisco's servers and now Cisco is the #2 vendor for blade servers in the US and Australia.
This will hit Counter Terrorism units hard
Or maybe that is the real reason that there's always so many insiders and terrorist breaches on 24. It's all the Cisco Telepresence kit that they use in CTU.
"Cisco has had more success than most with its TelePresence systems"
Yes, buy Tandberg and suddenly you are more successful than most.
Don't innovate and create, just buy.
Usual overcomplicated overpriced Cisco ripoff
On the plus, at least they admit to the issue and will fix it. But. The only reason Cisco kit sells is that the serial cable jockeys get to waste more time and money validating their leet ios skillz. Meanwhile you can do better with a £80 webcam and a copy of Skype, or any of a dozen other click and go tools..
where are their heads?!!?
"They were uncovered after laboratory testing of the software and during normal software security audits."
these things should have been tested for and caught BEFORE being released to the gamma testing crews and definitely BEFORE being foisted on the public... this is one major reason why the industry, as a whole, has really gotten me down... no one properly tests their kit any more and they throw it out the door to the unsuspecting public for them to find the bugs IF they find and report them... in the mean time, the blackhats get to gander at everyone's knickers :/
- Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
- Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
- Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
- Feast your PUNY eyes on highest resolution phone display EVER
- AMD demos 'Berlin' Opteron, world's first heterogeneous system architecture server chip