First published: Fri Nov 15 2024(Updated: )
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | ||
Cisco RoomOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20093 is rated as high severity due to its potential for arbitrary file overwrite by an authenticated local attacker.
CVE-2023-20093 affects Cisco TelePresence Collaboration Endpoint by allowing authenticated local attackers to overwrite files due to improper access controls.
To fix CVE-2023-20093, update your Cisco TelePresence Collaboration Endpoint or RoomOS to the latest version that addresses this vulnerability.
If you suspect exploitation of CVE-2023-20093, immediately check for unauthorized file changes and apply the necessary updates to your affected devices.
Currently, there are no documented workarounds for CVE-2023-20093, so applying the patch is recommended.