First published: Wed Aug 18 2021(Updated: )
A vulnerability in the image verification function of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with internal user privileges on the underlying operating system. The vulnerability is due to insufficient validation of the content of upgrade packages. An attacker could exploit this vulnerability by uploading a malicious archive to the Upgrade page of the administrative web interface. A successful exploit could allow the attacker to execute code with user-level privileges (the _nobody account) on the underlying operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | <=x8.8.0 | |
Cisco TelePresence Video Communication Server | <=x8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34715 is a vulnerability in the image verification function of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) that allows an authenticated, remote attacker to execute code with internal user privileges on the underlying operating system.
CVE-2021-34715 has a severity score of 7.2, which is considered critical.
Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) versions up to x8.8.0 are affected by CVE-2021-34715.
An attacker can exploit CVE-2021-34715 by gaining authenticated remote access and executing code with internal user privileges on the underlying operating system.
Yes, Cisco has released a security advisory with the necessary patches and mitigation details for CVE-2021-34715.