First published: Wed Jan 22 2025(Updated: )
A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device. This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20156 is considered a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2025-20156, apply the latest security patches provided by Cisco for the Meeting Management software.
The vulnerability affects authenticated users with low privileges on Cisco Meeting Management devices.
CVE-2025-20156 is a privilege escalation vulnerability in the REST API of Cisco Meeting Management.
Yes, CVE-2025-20156 can be exploited remotely by an authenticated user with low privileges.