A single sign-on (SSO) implementation flaw in the Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform might make it possible for a remote, unauthenticated attacker to forge credentials to access a vulnerable system.
This “Critical” severity vulnerability has a CVSS base score of 10.0 and is tracked as CVE-2023-20238.
Cisco has issued software upgrades to address this vulnerability. There are no workarounds that address this vulnerability.
Cisco stated that the process used to validate SSO tokens causes this vulnerability. By logging into the application using fake credentials, an attacker might take advantage of this vulnerability.
“This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials”, Cisco said in its Security Advisory.
If the vulnerability is successful, the attacker may be able to use the forged account to execute commands or commit toll fraud. Further, the attacker would be able to read sensitive data, change customer settings, or change settings for other users if that account is an Administrator account.
“If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users,” Cisco said.
The attacker would require a legitimate user ID linked to an affected Cisco BroadWorks system to take advantage of this flaw.
If you are running a vulnerable release of Cisco BroadWorks and have enabled one of the following applications, you are vulnerable to this issue.
Cisco has made free software upgrades available to fix this issue.
Customers are encouraged to upgrade to an applicable fixed software release as soon as feasible.
Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…