First published: Fri Jan 14 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) and Cisco Unified Contact Center Domain Manager (Unified CCDM) could allow an authenticated, remote attacker to elevate their privileges to Administrator. This vulnerability is due to the lack of server-side validation of user permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to a vulnerable system. A successful exploit could allow the attacker to create Administrator accounts. With these accounts, the attacker could access and modify telephony and user resources across all the Unified platforms that are associated to the vulnerable Cisco Unified CCMP. To successfully exploit this vulnerability, an attacker would need valid Advanced User credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express | =12.0.1 | |
Cisco Unified Contact Center Express | =12.5.1 | |
Cisco Unified Contact Center Management Portal | <=11.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2022-20658.
The severity of CVE-2022-20658 is critical with a CVSS score of 9.6.
Cisco Unified Contact Center Express versions 12.0.1 and 12.5.1, as well as Cisco Unified Contact Center Management Portal version up to 11.6.1, are affected by this vulnerability.
An authenticated, remote attacker could elevate their privileges to Administrator.
Yes, Cisco has released a security advisory with the necessary patches and mitigations. Please refer to the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccmp-priv-esc-JzhTFLm4 for more information.