Daily Tech News, Interviews, Reviews and Updates

CISCO declares the availability of patches for a critical vulnerability in Enterprises and Communication solutions

According to the technology company, CISCO, the vulnerability affects Expressway Control (Expressway-C) and Expressway Edge devices, which are meant to enable remote collaboration for both mobile users and teleworkers.

“Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device,” Cisco notes in an advisory.

Tracked as CVE-2022-20812 (CVSS score of 9.0), the critical severity vulnerability could allow an authenticated attack that has administered read-write privileges to overwrite files on the underlying operating system remotely, with the privileges of the root user.

The issue exists due to the user-supplied command arguments that are not sufficiently validated, allowing an attacker to submit crafted input to the affected command.

Cisco also resolved a high-severity bug impacting the enterprise communication solutions, which could allow an unauthenticated, remote attacker to access sensitive data.

“This week, Cisco also announced patches for a high-severity vulnerability in Smart Software Manager On-Prem (SSM On-Prem), which could allow a remote, authenticated attacker to cause a denial of service (DoS) condition. Tracked as CVE-2022-20808, the vulnerability was addressed in Cisco SSM On-Prem release 8-202112,” a source as per Security Week.

“This vulnerability is due to incorrect handling of multiple simultaneous device registrations on Cisco SSM On-Prem. An attacker could exploit this vulnerability by sending multiple device registration requests to Cisco SSM On-Prem,” CISCO explains.

 



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More