First published: Wed Jul 06 2022(Updated: )
Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected
Credit: CVE-2022-20812 was found during internal security testing by Jason Crowder the Cisco Advanced Security Initiatives GroupCVE-2022-20813 was found during internal security testing by Deklan Evans the Cisco ASIG
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway Series | >=.0<14<=14.0<14.31 (late Apr 2023) | 14.31 (late Apr 2023) |
Cisco TelePresence VCS | >=.0<14<=14.0<14.31 (late Apr 2023) | 14.31 (late Apr 2023) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-expressway-overwrite-3buqW8LH is critical with a CVSS score of 9.
A remote attacker can exploit cisco-sa-expressway-overwrite-3buqW8LH by overwriting arbitrary files or conducting null byte poisoning attacks on an affected device.
The Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) are affected by cisco-sa-expressway-overwrite-3buqW8LH vulnerability.
To fix cisco-sa-expressway-overwrite-3buqW8LH vulnerability, update the affected devices to Cisco Expressway Series version 14.31 (late Apr 2023) or later.
CWE-36 refers to a null byte poisoning vulnerability.