Critical Flaws With Cisco Expressway Series and TelePresence VCS Let Attackers Execute Arbitrary Code

Cisco recently released a patch for a new generation of exploits that target some of its recently shipped products (Expressway Series and Cisco TelePresence Video Communication Server (VCS)). 

This security flaw leaves these devices susceptible to attacks, leaving them open to widespread vulnerabilities that Cisco promptly addressed by releasing the patch. On successful exploitation of these vulnerabilities, a threat actor can execute arbitrary code.

In total, there are five vulnerabilities, but, among the five, two are critical, and they tracked as:-

These two severe security flaws are related to an arbitrary file write and a command injection flaw in the API and web interfaces of the two that could have serious impacts on affected systems.

While these two critical security bugs were identified by Jason Crowder of the Cisco ASIG (Advanced Security Initiatives Group) during the routine internal security testing.

While other three vulnerabilities are identified in the following products of Cisco:-

  • StarOS
  • Cisco Identity Services Engine RADIUS Service
  • Cisco Ultra Cloud Core

Flaws Identified

Below we have mentioned all the five vulnerabilities that are detected:-

  • CVE-2022-20754: It’s a Cisco Expressway Series and Cisco TelePresence VCS Arbitrary File Write Vulnerability with a CVSS score of 9.0.
  • CVE-2022-20755: It’s a Cisco Expressway Series and Cisco TelePresence VCS Command Injection Vulnerability with a CVSS score of 9.0.
  • CVE-2022-20665: It’s a Cisco StarOS Command Injection Vulnerability with a CVSS score of 6.0.
  • CVE-2022-20756: It’s a Cisco Identity Services Engine RADIUS Service Denial of Service Vulnerability with a CVSS score of 8.6.
  • CVE-2022-20762: It’s a Cisco Ultra Cloud Core – Subscriber Microservices Infrastructure Privilege Escalation Vulnerability with a CVSS score of 7.8.

However, Cisco has claimed that they didn’t see any evidence of exploitation of these security flaws. Cisco uncovered these bugs while carrying out their own internal security testing or while fixing the bugs reported by the Technical Assistance Center (TAC). 

They played around with the idea that you couldn’t massively hack into devices if the misconfigurations were identified, cleared up, and fixed straight away.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…

3 hours ago

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…

24 hours ago

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…

1 day ago

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…

1 day ago

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…

1 day ago

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…

1 day ago