First published: Wed Nov 18 2020(Updated: )
A vulnerability in the xAPI service of Cisco Telepresence CE Software and Cisco RoomOS Software could allow an authenticated, remote attacker to generate an access token for an affected device. The vulnerability is due to insufficient access authorization. An attacker could exploit this vulnerability by using the xAPI service to generate a specific token. A successful exploit could allow the attacker to use the generated token to enable experimental features on the device that should not be available to users. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence | =9.12<9.12.4=9.10<9.10.3 | 9.12.4 9.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-tp-uathracc-jWNESUfM is considered high due to the potential for unauthorized access to devices.
To fix cisco-sa-tp-uathracc-jWNESUfM, update the Cisco Telepresence software to the latest version as recommended by Cisco.
cisco-sa-tp-uathracc-jWNESUfM affects Cisco Telepresence systems running versions 9.12 and 9.10 up to specific releases.
No, the cisco-sa-tp-uathracc-jWNESUfM vulnerability requires an authenticated attacker to exploit it.
cisco-sa-tp-uathracc-jWNESUfM allows an authenticated attacker to generate unauthorized access tokens for affected devices.