10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
53.1%
According to its self-reported version, Cisco Unity Connection running on the report host is affected by a remote code execution (RCE) vulnerability. Due to improper processing of user-provided data that is being read into memory, an unauthenticated, remote, attacker can execute arbitrary code with the privileges of the web services users. With access to the underlying operating system, the attacker could also establish root access on the affected device.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(189532);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/02");
script_cve_id("CVE-2024-20253");
script_xref(name:"CISCO-BUG-ID", value:"CSCwd64292");
script_xref(name:"CISCO-SA", value:"cisco-sa-cucm-rce-bWNzQcUm");
script_xref(name:"IAVA", value:"2024-A-0056");
script_name(english:"Cisco Unity Connection RCE (cisco-sa-cucm-rce-bWNzQcUm)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Unity Connection running on the report host is affected by a remote
code execution (RCE) vulnerability. Due to improper processing of user-provided data that is being read into memory,
an unauthenticated, remote, attacker can execute arbitrary code with the privileges of the web services users. With
access to the underlying operating system, the attacker could also establish root access on the affected device.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4341e9c8");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd64292");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwd64292");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-20253");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/01/24");
script_set_attribute(attribute:"patch_publication_date", value:"2024/01/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/01/25");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:unity_connection");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_uc_version.nasl");
script_require_keys("installed_sw/Cisco VOSS Unity");
exit(0);
}
include('vcf.inc');
var app_info = vcf::get_app_info(app:'Cisco VOSS Unity');
var version_active = get_kb_item('Host/Cisco/show_version_active');
if ('CSCwd64292' >< version_active)
audit(AUDIT_HOST_NOT, 'affected due to an installed security patch');
var constraints = [
# https://software.cisco.com/download/home/286313379/type/286319533/release/12.5(1)SU8
{ 'min_version': '11.5.1', 'fixed_version': '12.5.1.18900.16', 'fixed_display': '12.5(1)SU8 or ciscocm.cuc.v1_java_deserial-CSCwd64292.k4.cop' },
# https://software.cisco.com/download/home/286328409/type/286319533/release/14SU3
{ 'min_version': '14.0', 'fixed_version': '14.0.1.13900.70', 'fixed_display': '14SU3 or ciscocm.cuc.v1_java_deserial-CSCwd64292.k4.cop' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | unity_connection | cpe:/a:cisco:unity_connection |
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
53.1%