Cisco Unified Communications Flaw Let Attackers Execute Arbitrary Code

by Esmeralda McKenzie
Cisco Unified Communications Flaw Let Attackers Execute Arbitrary Code

Cisco Unified Communications Flaw Let Attackers Execute Arbitrary Code

Cisco Unified Communications Flaw Let Attackers Enact Arbitrary Code

Cisco Unified Communications and Contact Center Solutions, known for their robustness, comprise honest no longer too lengthy previously been below scrutiny on account of a severe vulnerability.

This flaw exposes an unsettling prospect: an unauthenticated, far away attacker gaining the flexibility to stay arbitrary code on affected gadgets. Listed right here, we dissect the intricacies of this security lapse.

EHA

The vulnerability CVE-2024-20253 stems from the corrupt processing of user-supplied records, permitting attackers to take advantage of the blueprint by sending a fastidiously crafted message to a listening port.

The final outcome? The likely execution of arbitrary commands with the privileges of the rep products and companies user ends in an ominous scenario where the attacker might almost definitely almost definitely save root gain admission to on the affected tool.

The Affected Merchandise and Exempted Solutions

The vulnerability affects loads of Cisco merchandise, including Unified Communications Supervisor, IM & Presence Carrier, Session Administration Version, Contact Center Categorical, Solidarity Connection, and Virtualized Grunt Browser.

Affected Gadgets

  • Unified Communications Supervisor (Unified CM) (CSCwd64245)
  • Unified Communications Supervisor IM & Presence Carrier (Unified CM IM&P) (CSCwd64276)
  • Unified Communications Supervisor Session Administration Version (Unified CM SME) (CSCwd64245)
  • Unified Contact Center Categorical (UCCX) (CSCwe18773)
  • Solidarity Connection (CSCwd64292)
  • Virtualized Grunt Browser (VVB) (CSCwe18840)

Alternatively, Cisco clarifies that determined merchandise, equivalent to Customer Collaboration Portal and Unified Contact Center Challenge, remain unscathed.

Cisco’s Response: Instrument Updates and Mitigation Measures

Cisco without notice spoke back to this possibility, releasing utility updates to address the vulnerability.

Alternatively, there are no longer any workarounds accessible. The supplied mitigation entails establishing gain admission to withhold watch over lists (ACLs) on middleman gadgets, limiting gain admission to to the ports of deployed products and companies.

Customers are entreated to envision with Cisco’s documentation for comprehensive steering on mitigating the possibility.

The document acknowledges Julien Egloff from Synacktiv for reporting this vulnerability, highlighting the collaborative efforts all the design thru the cybersecurity neighborhood to beef up digital defenses.

At fresh, the Cisco Product Security Incident Response Team (PSIRT) has no recordsdata of any cases where the vulnerability outlined in this advisory has been publicly disclosed or exploited for malicious applications.

Source credit : cybersecuritynews.com

Related Posts