First published: Wed Nov 18 2020(Updated: )
The Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software supports the relay of media connections through a firewall using proxy services. As a result of this feature, interfaces such as the Cisco Expressway web administrative interface may become accessible from external networks. At the time of publication, documentation of the feature did not properly explain that users are able to bypass firewall protections that are designed to restrict access to the Cisco Expressway web administrative interface. However, an attacker must have credentials sufficient to use TURN services to be able to send network requests to the web administrative interface. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-Expressway-8J3yZ7hV
Credit: Christian Mehlmauer WienCERT
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence VCS and Expressway Major |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-Expressway-8J3yZ7hV is classified as high due to potential unauthorized access through media connection relaying.
To fix cisco-sa-Expressway-8J3yZ7hV, apply the latest security patches provided by Cisco for the affected Expressway software.
The implications of cisco-sa-Expressway-8J3yZ7hV include the risk of unauthorized access and potential exposure of sensitive media connections.
cisco-sa-Expressway-8J3yZ7hV affects multiple versions of the Cisco Expressway software, particularly the Expressway-C component.
The impacted component in cisco-sa-Expressway-8J3yZ7hV is the Traversal Using Relays around NAT (TURN) server within the Cisco Expressway.