First published: Wed Sep 04 2024(Updated: )
A vulnerability in Cisco Expressway Edge (Expressway-E) could allow an authenticated, remote attacker to masquerade as another user on an affected system.This vulnerability is due to inadequate authorization checks for Mobile and Remote Access (MRA) users. An attacker could exploit
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-expressway-auth-kdFrcZ2j is rated as high due to the potential for unauthorized user impersonation.
To fix cisco-sa-expressway-auth-kdFrcZ2j, users should apply the latest security updates provided by Cisco for the Expressway Edge system.
Users of Cisco Expressway Edge are affected by cisco-sa-expressway-auth-kdFrcZ2j if they rely on Mobile and Remote Access functionalities.
An attacker exploiting cisco-sa-expressway-auth-kdFrcZ2j could masquerade as another user, compromising the integrity and confidentiality of the affected system.
Currently, there are no announced workarounds for cisco-sa-expressway-auth-kdFrcZ2j, so applying the patches is the primary mitigation.