First published: Wed Jul 06 2022(Updated: )
Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | <x14.0.7 | |
Cisco TelePresence Video Communication Server | <x14.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20813 is critical.
The affected software for CVE-2022-20813 is Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) up to and excluding x14.0.7.
The vulnerabilities in CVE-2022-20813 include remote arbitrary file overwrite and null byte poisoning attacks.
A remote attacker can exploit CVE-2022-20813 by overwriting arbitrary files or conducting null byte poisoning attacks on an affected device.
Yes, Cisco has released a security advisory with the necessary patches and fixes for CVE-2022-20813. Please refer to the Cisco Security Advisory for more details.