First published: Wed Feb 06 2019(Updated: )
A vulnerability in the web interface of Cisco TelePresence Conductor, Cisco Expressway Series, and Cisco TelePresence Video Communication Server (VCS) Software could allow an authenticated, remote attacker to trigger an HTTP request from an affected server to an arbitrary host. This type of attack is commonly referred to as server-side request forgery (SSRF). The vulnerability is due to insufficient access controls for the REST API of Cisco Expressway Series and Cisco TelePresence VCS. An attacker could exploit this vulnerability by submitting a crafted HTTP request to the affected server. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-rest-api-ssrf
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Conductor Firmware | ||
Cisco Expressway | ||
Cisco TelePresence Video Communication Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190206-rest-api-ssrf is considered high due to the potential for remote exploitation.
To fix cisco-sa-20190206-rest-api-ssrf, apply the latest firmware updates provided by Cisco for affected products.
The affected products for cisco-sa-20190206-rest-api-ssrf include Cisco TelePresence Conductor, Cisco Expressway Series, and Cisco TelePresence Video Communication Server.
The cisco-sa-20190206-rest-api-ssrf vulnerability can be exploited by authenticated remote attackers.
The cisco-sa-20190206-rest-api-ssrf vulnerability allows attackers to trigger HTTP requests from the affected server to arbitrary hosts.