First published: Wed Feb 07 2024(Updated: )
A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | ||
Cisco Expressway-C | <15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20255 is classified as a critical vulnerability due to the potential for unauthenticated remote attackers to execute cross-site request forgery attacks.
To mitigate CVE-2024-20255, ensure that you apply the latest security patches provided by Cisco for the affected software.
CVE-2024-20255 affects the Cisco Expressway Series collaboration gateways and Cisco TelePresence Video Communication Server.
CVE-2024-20255 allows an unauthenticated remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
The vulnerability in CVE-2024-20255 is due to insufficient protections against cross-site request forgery in the SOAP API of the affected Cisco products.