First published: Fri May 03 2019(Updated: )
A vulnerability in the management web interface of Cisco Expressway Series could allow an authenticated, remote attacker to perform a directory traversal attack against an affected device. The vulnerability is due to insufficient input validation on the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to bypass security restrictions and access the web interface of a Cisco Unified Communications Manager associated with the affected device. Valid credentials would still be required to access the Cisco Unified Communications Manager interface.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Video Communication Server | =x8.11.4 | |
=x8.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1854.
The severity of CVE-2019-1854 is medium with a severity value of 4.3.
Cisco TelePresence Video Communication Server version x8.11.4 is affected by CVE-2019-1854.
The CWE number for CVE-2019-1854 is CWE-20 and CWE-22.
An attacker can exploit CVE-2019-1854 by performing a directory traversal attack against an affected device through the management web interface.