First published: Fri Nov 15 2024(Updated: )
A vulnerability in the REST API of Cisco Expressway Series and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence VCS and Expressway Major | ||
Cisco TelePresence Video Communication Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20853 is classified as a medium severity vulnerability due to its potential for unauthorized remote access.
To mitigate CVE-2022-20853, apply the latest security patches provided by Cisco for the affected Cisco Expressway Series and Cisco TelePresence VCS products.
CVE-2022-20853 affects the Cisco Expressway Series and Cisco TelePresence VCS systems.
CVE-2022-20853 enables an unauthenticated remote attacker to conduct a cross-site request forgery (CSRF) attack.
No, CVE-2022-20853 can be exploited by an unauthenticated attacker without the need for authentication.