First published: Wed Jun 03 2020(Updated: )
A vulnerability in the API subsystem of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to change the availability state of any agent. The vulnerability is due to insufficient authorization enforcement on an affected system. An attacker could exploit this vulnerability by authenticating to an affected system with valid agent credentials and performing a specific API call with crafted input. A successful exploit could allow the attacker to change the availability state of an agent, potentially causing a denial of service condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-api-auth-WSx4v7sB
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express Enhanced |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-uccx-api-auth-WSx4v7sB is considered high severity due to its potential impact on agent availability.
To mitigate cisco-sa-uccx-api-auth-WSx4v7sB, apply the recommended security patches provided by Cisco.
cisco-sa-uccx-api-auth-WSx4v7sB affects the Cisco Unified Contact Center Express system.
An authenticated attacker exploiting cisco-sa-uccx-api-auth-WSx4v7sB can change the availability state of any agent.
Yes, the vulnerability cisco-sa-uccx-api-auth-WSx4v7sB can be exploited remotely by an authenticated user.