First published: Thu Nov 03 2022(Updated: )
A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]]
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco BroadWorks Messaging Server | <23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20951 is a vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application that allows an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device.
CVE-2022-20951 occurs due to insufficient validation of user-supplied input in the web-based management interface of Cisco BroadWorks CommPilot application.
The severity of CVE-2022-20951 is high with a CVSS score of 6.5.
An attacker can exploit CVE-2022-20951 by using the web-based management interface of Cisco BroadWorks CommPilot application to perform a server-side request forgery (SSRF) attack.
Yes, Cisco has released a security advisory with mitigations and software updates to address CVE-2022-20951. Please refer to the Cisco Security Advisory for more information.