First published: Wed May 18 2022(Updated: )
Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV
Credit: Jason Crowder the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway Series | >=.0<14<=14.0<14.0.7 | 14.0.7 |
Cisco TelePresence VCS | >=.0<14<=14.0<14.0.7 | 14.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for these vulnerabilities is cisco-sa-expressway-filewrite-bsFVwueV.
The severity of the cisco-sa-expressway-filewrite-bsFVwueV vulnerability is medium with a severity value of 5.5.
The Cisco Expressway Series and Cisco TelePresence Video Communication Server software versions up to 14.0.7 are affected.
An authenticated, remote attacker can exploit the cisco-sa-expressway-filewrite-bsFVwueV vulnerability to write files or disclose sensitive information on an affected device.
You can find more information about the cisco-sa-expressway-filewrite-bsFVwueV vulnerability in the Cisco Security Advisory at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV.