Lucene search

K
ciscoCiscoCISCO-SA-EXPRESSWAY-INJECTION-X475EBTQ
HistoryAug 16, 2023 - 4:00 p.m.

Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability

2023-08-1616:00:00
tools.cisco.com
35
cisco
expressway
telepresence
command injection
vulnerability
remote code execution
software update

EPSS

0.001

Percentile

44.9%

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ”]

Affected configurations

Vulners
Node
ciscotelepresence_video_communication_serverMatchanyexpressway
OR
ciscotelepresence_video_communication_serverMatchanyexpressway
VendorProductVersionCPE
ciscotelepresence_video_communication_serveranycpe:2.3:a:cisco:telepresence_video_communication_server:any:*:*:*:expressway:*:*:*

EPSS

0.001

Percentile

44.9%

Related for CISCO-SA-EXPRESSWAY-INJECTION-X475EBTQ