First published: Wed Jul 06 2022(Updated: )
Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | <x14.0.7 | |
Cisco TelePresence Video Communication Server | <x14.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20812.
The severity of CVE-2022-20812 is critical.
Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) versions up to exclusive x14.0.7 are affected by CVE-2022-20812.
A remote attacker can overwrite arbitrary files or conduct null byte poisoning attacks on an affected device.
Yes, you can find more information on CVE-2022-20812 at the following URLs: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-sqpsSfY6) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-overwrite-3buqW8LH).