First published: Wed Aug 16 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Video Communication Server | <14.3.1 | |
Cisco TelePresence Video Communication Server | <14.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20209
The severity of CVE-2023-20209 is high with a severity value of 7.2.
The affected software of CVE-2023-20209 is Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) version up to 14.3.1.
CVE-2023-20209 is a vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) that could allow an authenticated, remote attacker to perform a command injection attack resulting in remote code execution.
To fix CVE-2023-20209, it is recommended to apply the necessary security updates provided by Cisco.