Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk"]
{"id": "CISCO-SA-EXPRESSWAY-FILEWRITE-87Q5YRK", "vendorId": null, "type": "cisco", "bulletinFamily": "software", "title": "Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities", "description": "Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user.\n\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\n\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\n\nThis advisory is available at the following link:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk\"]", "published": "2022-03-02T16:00:00", "modified": "2022-03-02T16:00:00", "cvss": {"score": 9.0, "vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L"}, "cvss2": {}, "cvss3": {}, "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk", "reporter": "Cisco", "references": ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk"], "cvelist": ["CVE-2022-20754", "CVE-2022-20755"], "immutableFields": [], "lastseen": "2022-12-17T06:19:24", "viewCount": 19, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2022-20754", "CVE-2022-20755"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:B7BB0AE92C6660541E7EA9177E63D3A1"]}, {"type": "nessus", "idList": ["CISCO-SA-EXPRESSWAY-FILEWRITE-87Q5YRK.NASL"]}, {"type": "thn", "idList": ["THN:202225EEA677277931C36E9F60459E43"]}]}, "score": {"value": 1.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "cisa", "idList": ["CISA:93E7357FB536D06DB94DCD85A6EA4A80"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:B7BB0AE92C6660541E7EA9177E63D3A1"]}, {"type": "nessus", "idList": ["CISCO-SA-EXPRESSWAY-FILEWRITE-87Q5YRK.NASL"]}, {"type": "thn", "idList": ["THN:202225EEA677277931C36E9F60459E43"]}]}, "epss": [{"cve": "CVE-2022-20754", "epss": "0.000670000", "percentile": "0.273660000", "modified": "2023-03-19"}, {"cve": "CVE-2022-20755", "epss": "0.000780000", "percentile": "0.316160000", "modified": "2023-03-19"}], "vulnersScore": 1.5}, "_state": {"dependencies": 1671258829, "score": 1671259607, "affected_software_major_version": 1671260116, "epss": 1679308852}, "_internal": {"score_hash": "efae42cf929447ee804747f515d29110"}, "affectedSoftware": [{"version": "any", "operator": "eq", "name": "cisco telepresence video communication server (vcs) expressway"}, {"version": "any", "operator": "eq", "name": "cisco telepresence video communication server (vcs) expressway"}], "vendorCvss": {"score": "9.0", "severity": "critical"}}
{"nessus": [{"lastseen": "2023-01-10T19:17:05", "description": "According to its self-reported version, the instance of Cisco TelePresence VCS installed on the remote host contains vulnerabilities in its cluster database API and its web-based management interface due to insufficient input validation of user-supplied command arguments. An authenticated, remote attacker with read/write privileges can exploit this issue, by sending crafted requests, to overwrite arbitrary files on the underlying operating system as the root user.\n Please see the included Cisco BIDs and Cisco Security Advisory for more information.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-03-07T00:00:00", "type": "nessus", "title": "Cisco TelePresence VCS < 14.0.5 Multiple Vulnerabilities (cisco-sa-expressway-filewrite-87Q5YRk)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-20754", "CVE-2022-20755"], "modified": "2022-05-30T00:00:00", "cpe": ["cpe:2.3:a:cisco:telepresence_video_communication_server_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*"], "id": "CISCO-SA-EXPRESSWAY-FILEWRITE-87Q5YRK.NASL", "href": "https://www.tenable.com/plugins/nessus/158651", "sourceData": "#TRUSTED 8f6f43c20fffbb4c7afd7c57654cd3137ea7eb0f897b9b4cdf64179277923a9a004296d0458cf4b44df63aec0bcd91f9a4af3cd9d2d310823581dd18c223e78677ccf90ead393cda7c4ecce1c2b1942526b39f1eca0f2a154a23240a603b1574d80e8c7f17d4606240a33a92aee956e8c4da40c188129d47fb6dbc5f86e598a792c5f8ebe746e276dc0ea56f4eb00ada28ab6b0a38cf1fa2f7e41301d943e58ce6e89ac3a4d58358cfb782ab32ac8c74bda669b953855ea40e4f0e997af965f113569644bf0f7b3aa01e1c7f475fae85d70dec7312abb74b7229ab8f0c04c13c33363abcf749d8f6c43d1fb7b69ad7399aa3c0491ca282700fbef987f12d952feb82313e30430eaaa0a7b34bb97deb1ea7adc835948344e7a6a1e825ab9eb830e66b6a9438c87c26e5ff5c1ea99eecf722c468e34bea7d17eabc13f7b5e2608dae4fe415ac5f21f9fbc16eac446f819a85ffde39f3b7410e37d5898f27ed818239877bb439e84e1c385de04b881b84a023e5ccaef612df6859f25e9d2b9cc35534d0688488c471ba79ab48774409204c615b79bc977407e4e72fd637892ec3acfb25ea94bb54bc5658c16a68cf7e1d84a022df080c9135dcb7479a31d3ea274cf87817feb77f8984e23b785689a2b30039e43842c7207c583f0de02437e6adcfa0dbec108fa5571607b5eb905949fcf478e7ccbbdce8ed24b10320de980c6192\n#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(158651);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/30\");\n\n script_cve_id(\"CVE-2022-20754\", \"CVE-2022-20755\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCvz85393\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCwa25107\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-expressway-filewrite-87Q5YRk\");\n script_xref(name:\"IAVA\", value:\"2022-A-0097-S\");\n\n script_name(english:\"Cisco TelePresence VCS < 14.0.5 Multiple Vulnerabilities (cisco-sa-expressway-filewrite-87Q5YRk)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is missing a vendor-supplied security patch.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, the instance of Cisco TelePresence VCS installed on the remote host contains\nvulnerabilities in its cluster database API and its web-based management interface due to insufficient input\nvalidation of user-supplied command arguments. An authenticated, remote attacker with read/write privileges can\nexploit this issue, by sending crafted requests, to overwrite arbitrary files on the underlying operating system as\nthe root user.\n \nPlease see the included Cisco BIDs and Cisco Security Advisory for more information.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?69a6823e\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz85393\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa25107\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvz85393, CSCwa25107\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-20755\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(23, 78);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/03/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/03/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/03/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:cisco:telepresence_video_communication_server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:cisco:telepresence_video_communication_server_software\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"cisco_telepresence_video_communication_server_detect.nbin\");\n script_require_keys(\"Cisco/TelePresence_VCS/Version\");\n\n exit(0);\n}\n\ninclude('ccf.inc');\n\nvar product_info = cisco::get_product_info(name:'Cisco TelePresence VCS');\nvar vuln_ranges = [{ 'min_ver':'0.0', 'fix_ver' : '14.0.5' }];\n\nvar reporting = make_array(\n 'port' , 0,\n 'severity' , SECURITY_HOLE,\n 'version' , product_info['version'],\n 'bug_id' , 'CSCwa25107, CSCvz85393',\n 'disable_caveat', TRUE\n);\n\ncisco::check_and_report(\n product_info:product_info,\n reporting:reporting,\n vuln_ranges:vuln_ranges\n);", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "malwarebytes": [{"lastseen": "2022-03-04T19:27:20", "description": "Cisco has released a [security advisory](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk>) about two vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS). The flaws could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user.\n\nPublicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). These are the CVEs you need to know:\n\n## CVE-2022-20754\n\nThe first vulnerability exists in the cluster database API of Cisco Expressway Series and Cisco TelePresence VCS. This vulnerability is due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by authenticating to the system as an administrative user and then submitting crafted input to the affected command. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system as the root user. \n\n## CVE-2022-20755\n\nThe second vulnerability exists in the web-based management interface of Cisco Expressway Series and Cisco TelePresence VCS. This vulnerability is alos due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by authenticating to the system as an administrative user and then submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.\n\n## Mitigation\n\nThe following products are affected by these vulnerabilities:\n\n * Cisco Expressway: X14.0.3 - X14.0.4\n * TelePresence Video Communication Server (VCS): X14.0.3 - X14.0.4\n\nFor these two vulnerabilities there are no workarounds. The only way to address them is to install the [free software updates](<https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu>) provided by Cisco. Both vulnerabilities received [CVSS scores](<https://blog.malwarebytes.com/malwarebytes-news/2020/05/how-cvss-works-characterizing-and-scoring-vulnerabilities/>) of 9 out of 10 and are rated critical. Therefore, customers are urged to update to the latest versions as soon as possible.\n\n## Known exploited vulnerabilities catalog\n\nThe two vulnerabilities that were included in the security advisory were found during internal security testing, so there is no reason to assume that they are being exploited in the wild. The same is true for two high-severity vulnerabilities in Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) and Identity Services Engine (ISE) patched earlier. These are [CVE-2022-20762](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20762>) (CVSS score of 7.8) and [CVE-2022-20756](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20756>) (CVSS score of 8.6). Another vulnerability patched this week was [CVE-2022-20665](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20665>) (CVSS score of 6.0) in the command line interface of Cisco StarOS which could allow an authenticated, local attacker to elevate privileges on an affected device.\n\nWhile these vulnerabilities are not known to be exploited in the wild, looking at the catalog maintained by the Cybersecurity and Infrastructure Security Agency (CISA) that [covers known exploited vulnerabilities](<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>) you will notice that of the 95 vulnerabilities that were added yesterday, 3 March, 38 are Cisco\u2019s.\n\nThe affected products:\n\n * Small Business RV160, RV260, RV340, and RV345 Series Routers\n * Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers\n * Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches\n * Catalyst 6800 Series Switches\n * Cisco IOS XE Software\n * IOS, XR, and XE Software\n\nSome of these vulnerabilities need to be fixed by 17 March, 2022, while others have a due date of 24 March. These types of vulnerabilities are considered a frequent attack vector for threat actors and to pose a significant risk.\n\nThe Known Exploited Vulnerabilities Catalog has been established to act as a living list of known CVEs that carry significant risk to the federal government. [Binding Operational Directive (BOD) 22-01](<https://blog.malwarebytes.com/reports/2021/11/cisa-sets-two-week-window-for-patching-serious-vulnerabilities/>) requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date. Although BOD 22-01 only applies to FCEB agencies, organizations are encouraged to play along too, and reduce their exposure to cyberattacks with prompt patching of the most serious vulnerabilities.\n\nStay safe, everyone!\n\nThe post [Update now! Cisco fixes several vulnerabilities](<https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/03/update-now-cisco-fixes-several-vulnerabilities/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "cvss3": {}, "published": "2022-03-04T18:10:11", "type": "malwarebytes", "title": "Update now! Cisco fixes several vulnerabilities", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2022-20665", "CVE-2022-20754", "CVE-2022-20755", "CVE-2022-20756", "CVE-2022-20762"], "modified": "2022-03-04T18:10:11", "id": "MALWAREBYTES:B7BB0AE92C6660541E7EA9177E63D3A1", "href": "https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/03/update-now-cisco-fixes-several-vulnerabilities/", "cvss": {"score": 0.0, "vector": "NONE"}}], "thn": [{"lastseen": "2022-05-09T12:37:29", "description": "[](<https://thehackernews.com/new-images/img/a/AVvXsEgfK1Il9pMh6NjuIQFYJPsbUGbUWe6rob3HMv2xXYFabMbvmdCU_xuurh5qD6kz3Nrv0vXCTP8OG8mkWxX0hljiK9ifLz-meo6tEM-8D9IiHEMKhm6derHkDNoeQKMwrejqAdxR_5Pa9S0T1WGHpjOXLCeqTQos2Gkt0g-45_K-3hFi_lx8PZB9JzLy>)\n\nCisco this week shipped patches to address a new round of critical security vulnerabilities affecting Expressway Series and Cisco TelePresence Video Communication Server (VCS) that could be exploited by an attacker to gain elevated privileges and execute arbitrary code.\n\nThe two flaws \u2013 tracked as [CVE-2022-20754 and CVE-2022-20755](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk>) (CVSS scores: 9.0) \u2013 relate to an arbitrary file write and a command injection flaw in the API and web-based management interfaces of the two products that could have serious impacts on affected systems.\n\nThe company said both the issues stem from insufficient input validation of user-supplied command arguments, a weakness that could be weaponized by an authenticated, remote attacker to carry out directory traversal attacks, overwrite arbitrary files, and run malicious code on the underlying operating system as the root user.\n\n\"These vulnerabilities were found during internal security testing by Jason Crowder of the Cisco Advanced Security Initiatives Group (ASIG),\" the company noted in its advisory published Wednesday.\n\nAlso addressed by Cisco are three other flaws in StarOS, Cisco Identity Services Engine RADIUS Service, and Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure software \u2013\n\n * [**CVE-2022-20665**](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-cmdinj-759mNT4n>) (CVSS score: 6.0) \u2013 A command injection vulnerability in Cisco StarOS that could allow an allow an attacker with administrative credentials to execute arbitrary code with root privileges\n * [**CVE-2022-20756**](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp>) (CVSS score: 8.6) \u2013 A denial-of-service (DoS) vulnerability affecting the [RADIUS feature](<https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215525-use-radius-for-device-administration-wit.html>) of Cisco Identity Services Engine (ISE)\n * [**CVE-2022-20762**](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccsmi-prvesc-BQHGe4cm>) (CVSS score: 7.8) \u2013 A privilege escalation flaw in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software that could permit an authenticated, local attacker to escalate to root privileges\n\nCisco also noted that it found no evidence of malicious exploitation of the vulnerabilities, adding they were either found during internal security testing or during the resolution of a Cisco Technical Assistance Center (TAC) support case.\n\nBut nevertheless, customers are urged to update to the latest versions as soon as possible to mitigate any potential in-the-wild attacks.\n\n \n\n\nFound this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter _\uf099_](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-03-03T13:25:00", "type": "thn", "title": "Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-20665", "CVE-2022-20754", "CVE-2022-20755", "CVE-2022-20756", "CVE-2022-20762"], "modified": "2022-03-03T13:33:04", "id": "THN:202225EEA677277931C36E9F60459E43", "href": "https://thehackernews.com/2022/03/critical-patches-issued-for-cisco.html", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2023-02-09T14:04:59", "description": "Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user. For more information about these vulnerabilities, see the Details section of this advisory.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-04-06T19:15:00", "type": "cve", "title": "CVE-2022-20754", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-20754"], "modified": "2022-04-14T15:43:00", "cpe": [], "id": "CVE-2022-20754", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-20754", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": []}, {"lastseen": "2023-02-09T14:04:59", "description": "Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the root user. For more information about these vulnerabilities, see the Details section of this advisory.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-04-06T19:15:00", "type": "cve", "title": "CVE-2022-20755", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-20755"], "modified": "2022-04-14T15:38:00", "cpe": [], "id": "CVE-2022-20755", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-20755", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": []}]}