Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on August 19, 2023, 06:04:11 AM

Title: Cisco Security Advisory - Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability
Post by: Netwörkheäd on August 19, 2023, 06:04:11 AM
Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.


This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges. 


Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.


This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ



     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2023-20209
Source: Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Expressway%20Series%20and%20Cisco%20TelePresence%20Video%20Communication%20Server%20Command%20Injection%20Vulnerability&vs_k=1)