Unrated severityNVD Advisory· Published Feb 3, 2011· Updated Apr 29, 2026
CVE-2011-0354
CVE-2011-0354
Description
The default configuration of Cisco Tandberg C Series Endpoints, and Tandberg E and EX Personal Video units, with software before TC4.0.0 has a blank password for the root account, which makes it easier for remote attackers to obtain access via an unspecified login method.
Affected products
19cpe:2.3:a:cisco:tandberg_endpoint:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:a:cisco:tandberg_endpoint:*:*:*:*:*:*:*:*range: <=tc3.1.3
- cpe:2.3:a:cisco:tandberg_endpoint:tc2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_endpoint:tc3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_endpoint:tc3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_endpoint:tc3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_endpoint:tc3.1.2:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:tandberg_endpoint:c20:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:tandberg_endpoint:c40:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:tandberg_endpoint:c60:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:tandberg_endpoint:c90:*:*:*:*:*:*:*
cpe:2.3:a:cisco:tandberg_personal_video_unit_software:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:cisco:tandberg_personal_video_unit_software:*:*:*:*:*:*:*:*range: <=tc3.1.3
- cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_personal_video_unit_software:tc3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_personal_video_unit_software:te1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:tandberg_personal_video_unit_software:te2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:cisco:tandberg_personal_video_unit:e20:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:h:cisco:tandberg_personal_video_unit:e20:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:tandberg_personal_video_unit:ex60:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:tandberg_personal_video_unit:ex90:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/43158nvdVendor Advisory
- www.cisco.com/en/US/products/ps11422/products_security_advisory09186a0080b69541.shtmlnvdVendor Advisory
- www.kb.cert.org/vuls/id/436854nvdUS Government Resource
- securityreason.com/securityalert/8060nvd
- securitytracker.com/idnvd
- tools.cisco.com/security/center/viewAlert.xnvd
- www.exploit-db.com/exploits/16100nvd
- www.securityfocus.com/bid/46107nvd
News mentions
0No linked articles in our index yet.