First published: Wed Aug 18 2021(Updated: )
A vulnerability in the image verification function of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with internal user privileges on the underlying operating system. The vulnerability is due to insufficient validation of the content of upgrade packages. An attacker could exploit this vulnerability by uploading a malicious archive to the Upgrade page of the administrative web interface. A successful exploit could allow the attacker to execute code with user-level privileges (the _nobody account) on the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewver-c6WZPXRx
Credit: Rui Ataide NetWitness Incident Response TeamHermes Bojaxhi NetWitness Incident Response Team
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | ||
Cisco TelePresence Video Communication Server Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ewver-c6WZPXRx is classified as high due to the potential for remote code execution.
To fix cisco-sa-ewver-c6WZPXRx, you should upgrade to the latest firmware version provided by Cisco for the affected products.
The vulnerability affects users of Cisco Expressway Series and Cisco TelePresence Video Communication Server.
cisco-sa-ewver-c6WZPXRx can enable authenticated remote attackers to execute arbitrary code with internal user privileges.
Yes, authentication is required for an attacker to exploit the cisco-sa-ewver-c6WZPXRx vulnerability.