Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on April 05, 2022, 06:13:24 AM

Title: Cisco Security Advisory - Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities
Post by: Netwörkheäd on April 05, 2022, 06:13:24 AM
Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities

<p>Multiple vulnerabilities in the API and web-based management interfaces of Cisco&nbsp;Expressway Series and Cisco&nbsp;TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read/write privileges to the application to write files or execute arbitrary code on the underlying operating system of an affected device as the <em>root </em>user.</p>
<p>For more information about these vulnerabilities, see the <a href="#details">Details</a> section of this advisory.</p>
<p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.&nbsp;</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk</a></p>
     
         
Security Impact Rating:  Critical
   
   
       
CVE: CVE-2022-20754,CVE-2022-20755
Source: Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Expressway%20Series%20and%20Cisco%20TelePresence%20Video%20Communication%20Server%20Vulnerabilities&vs_k=1)