First published: Wed Aug 16 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | ||
Cisco TelePresence Video Communication Server Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-expressway-injection-X475EbTQ vulnerability is classified as critical due to its potential for command injection by authenticated attackers.
To mitigate cisco-sa-expressway-injection-X475EbTQ, apply the latest firmware updates provided by Cisco for affected Expressway Series and TelePresence devices.
Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) users with an exposed web-based management interface are affected by cisco-sa-expressway-injection-X475EbTQ.
The cisco-sa-expressway-injection-X475EbTQ vulnerability facilitates command injection attacks, allowing attackers to execute arbitrary commands within the application.
An attacker must have authenticated access with read-write privileges to exploit cisco-sa-expressway-injection-X475EbTQ.