Recently it has been reported that a critical vulnerability has been detected in the Unified Contact Center Enterprise (UCCE) portfolio of Cisco.
By exploiting this critical security flaw a hacker can easily get privilege-escalation and platform takeover through which could access the telephone queues remotely.
This critical vulnerability is tracked as CVE-2022-20658, and it has been marked as “Critical.” And UCCE (Unified Contact Center Enterprise) of Cisco supports up to 24,000 customer-service agents for performing the following things:-
In short, UCCE (Unified Contact Center Enterprise) of Cisco is an on-premises customer-service platform.
Apart from this, since the beginning of January 2022, Cisco has already issued several security advisories. However, to address this critical vulnerability, Cisco has now rolled out the security updates for the:-
By submitting a specially crafted HTTP request to a vulnerable system, this critical vulnerability could be exploited, and apart from this, this flaw exists due to the lack of server-side validation of user permissions.
While on the successful exploitation of this flaw, an attacker can easily get all the admin privileges and even create another administrator accounts as well.
Across all the Unified platforms, the threat actor can access and modify the telephony and user resources by using the accounts created.
Here we have mentioned below the products that were affected by this flaw:-
For this vulnerability, there are patches available, and here they are mentioned below:-
Moreover, till now there is no such trace of exploitation of this vulnerability has been reported, but cybersecurity researchers have strongly recommended users to upgrade to the latest version immediately.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…