First published: Wed Dec 14 2016(Updated: )
A vulnerability in the HTTP traffic server component of Cisco Expressway could allow an unauthenticated, remote attacker to initiate TCP connections to arbitrary hosts. This does not allow for full traffic proxy through the Expressway. Affected Products: This vulnerability affects Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS). More Information: CSCvc10834. Known Affected Releases: X8.7.2 X8.8.3. Known Fixed Releases: X8.9.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway-C | =x8.7.2 | |
Cisco Expressway-C | =x8.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9207 has been assigned a medium severity rating due to its potential for unauthorized TCP connections.
To mitigate CVE-2016-9207, upgrade your Cisco Expressway to a non-vulnerable version such as X8.8.4 or later.
CVE-2016-9207 affects Cisco Expressway versions X8.7.2 and X8.8.3.
No, CVE-2016-9207 does not allow for full traffic proxy through the Expressway.
An unauthenticated, remote attacker can exploit CVE-2016-9207 to initiate TCP connections.