First published: Wed Aug 16 2023(Updated: )
A vulnerability in the Tomcat implementation for Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to cause a web cache poisoning attack on an affected device. This vulnerability is due to improper input validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a specific API endpoint on the Unified CCX Finesse Portal. A successful exploit could allow the attacker to cause the internal WebProxy to redirect users to an attacker-controlled host.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express | <12.5\(1\)_su2_es05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20232 is a vulnerability in the Tomcat implementation for Cisco Unified Contact Center Express (Unified CCX) that could allow an unauthenticated, remote attacker to cause a web cache poisoning attack on an affected device.
This vulnerability can be exploited by sending specially crafted HTTP requests to the affected device.
The severity of CVE-2023-20232 is medium, with a CVSS score of 5.3.
No, authentication is not required to exploit this vulnerability.
To mitigate this vulnerability, it is recommended to apply the necessary updates or patches provided by Cisco.