First published: Fri Nov 15 2024(Updated: )
A vulnerability in pairing process of Cisco TelePresence CE Software and RoomOS Software for Cisco Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device. This vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | ||
Cisco RoomOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20793 is considered a high severity vulnerability due to the potential for unauthorized device pairing.
To remedy CVE-2022-20793, upgrade your Cisco TelePresence CE Software and RoomOS Software to the latest versions provided by Cisco.
Organizations using Cisco TelePresence CE Software and Cisco RoomOS Software on Cisco Touch 10 Devices are affected by CVE-2022-20793.
Yes, CVE-2022-20793 can be exploited remotely by unauthenticated attackers to impersonate legitimate devices.
CVE-2022-20793 allows attackers to potentially gain unauthorized access to sensitive communications by impersonating legitimate devices.