First published: Wed Jun 19 2019(Updated: )
A vulnerability in the CLI configuration shell of Cisco Meeting Server could allow an authenticated, local attacker to inject arbitrary commands as the root user. The vulnerability is due to insufficient input validation during the execution of a vulnerable CLI command. An attacker with administrator-level credentials could exploit this vulnerability by injecting crafted arguments during command execution. A successful exploit could allow the attacker to perform arbitrary code execution as root on an affected product. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-cms-codex
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server | =2.3<2.3.81=2.2<2.2.141 | 2.3.81 2.2.141 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-20190619-CMS-CODEX is classified as high due to potential command injection vulnerabilities.
To fix Cisco-SA-20190619-CMS-CODEX, upgrade to Cisco Meeting Server version 2.3.82 or 2.2.142 or later.
Cisco-SA-20190619-CMS-CODEX affects users of Cisco Meeting Server versions 2.2 up to 2.2.141 and 2.3 up to 2.3.81.
An authenticated local attacker can exploit Cisco-SA-20190619-CMS-CODEX to inject arbitrary commands as the root user.
The vulnerability in Cisco-SA-20190619-CMS-CODEX is due to insufficient input validation during the execution of specific CLI commands.