Lucene search

K
ciscoCiscoCISCO-SA-20180502-CMS-CX
HistoryMay 02, 2018 - 4:00 p.m.

Cisco Meeting Server Remote Code Execution Vulnerability

2018-05-0216:00:00
tools.cisco.com
16

0.033 Low

EPSS

Percentile

91.4%

A vulnerability in Cisco Meeting Server could allow an unauthenticated, remote attacker to gain unauthorized access to components of, or sensitive information in, an affected system.

The vulnerability is due to incorrect default configuration of the device, which can expose internal interfaces and ports on the external interface of the system. A successful exploit could allow the attacker to gain unauthenticated access to configuration and database files as well as sensitive meeting information on an affected system.

Additionally, if the Traversal Using Relay NAT (TURN) service is enabled and utilizing Transport Layer Security (TLS) connections, an attacker could utilize TURN credentials to forward traffic to device daemons, allowing for remote exploitation.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-cms-cx [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-cms-cx”]

Affected configurations

Vulners
Node
ciscomeeting_serverMatchany
OR
ciscomeeting_serverMatchany

0.033 Low

EPSS

Percentile

91.4%

Related for CISCO-SA-20180502-CMS-CX