First published: Wed Jan 08 2025(Updated: )
A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information.This vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ThousandEyes Endpoint Agent | ||
Cisco RoomOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-thousandeyes-cert-pqtJUv9N is classified as high due to the potential for remote exploitation.
To fix cisco-sa-thousandeyes-cert-pqtJUv9N, users should update to the latest version of the Cisco ThousandEyes Endpoint Agent and RoomOS.
cisco-sa-thousandeyes-cert-pqtJUv9N affects the Cisco ThousandEyes Endpoint Agent for macOS and Cisco RoomOS.
Yes, cisco-sa-thousandeyes-cert-pqtJUv9N can be exploited remotely by an unauthenticated attacker.
The risks associated with cisco-sa-thousandeyes-cert-pqtJUv9N include the potential interception or manipulation of critical metrics information.