First published: Wed Jul 06 2022(Updated: )
A vulnerability in the Disaster Recovery framework of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to perform certain administrative actions they should not be able to. This vulnerability is due to insufficient access control checks on the affected device. An attacker with read-only privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to perform a set of administrative actions they should not be able to.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | >=14.0<14su2 | |
Cisco Unified Communications Manager IM and Presence Service | >=14.0<14.0su2 | |
Cisco Unity Connection | >=14.0<14su2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-20859.
The severity of CVE-2022-20859 is critical with a score of 8.8.
The affected software for CVE-2022-20859 includes Cisco Unified Communications Manager, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection.
An authenticated, remote attacker can exploit CVE-2022-20859 to perform certain administrative actions.
Yes, Cisco has released a security advisory with the necessary patches and mitigations for CVE-2022-20859.