U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-12948

Change History

Initial Analysis by NIST 8/06/2019 1:11:38 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:* versions up to (excluding) 5.8.5.1256
          *cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:* versions from (including) 5.9.3 up to (excluding) 5.9.3.2857
          *cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.0.4839
     OR
          cpe:2.3:h:polycom:c12:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:c16:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:c8:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx150:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx201:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx250:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx301:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx311:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx350:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx401:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx411:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx450:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx501:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx601:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:* versions up to (excluding) 5.8.5.1256
          *cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:* versions from (including) 5.9.3 up to (excluding) 5.9.3.2857
     OR
          cpe:2.3:h:polycom:vvx300:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx310:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx400:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx410:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx500:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:vvx600:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:polycom:united_communications_software:*:*:*:*:*:*:*:* versions up to (excluding) 4.0.14.1580
     OR
          cpe:2.3:h:polycom:soundpoint_ip_300:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_301:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_320:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_321:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_330:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_331:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_335:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_430:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_450:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_500:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_501:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_550:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_560:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_600:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_601:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_650:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_ip_670:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_pro_se-220:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundpoint_pro_se-225:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation2:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation2_avaya_2490:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation2_direct_connect_for_nortel:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation2w:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_duo:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_ip_4000:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_ip_5000:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_ip_6000:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_ip_7000:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_ip_7000_video_integration:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:soundstation_vtx_1000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:polycom:united_communications_software:*:*:*:*:*:*:*:* versions up to (excluding) 5.9.0
     OR
          cpe:2.3:h:polycom:trio_8500:-:*:*:*:*:*:*:*
          cpe:2.3:h:polycom:trio_8800:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Added CWE

								
							
							
						
CWE-749
Changed Reference Type
https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-1.pdf No Types Assigned
https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-1.pdf Vendor Advisory