Vulnerabilities

Cisco Patches Critical Vulnerability in Enterprise Collaboration Products

A critical flaw in Cisco Unified Communications and Contact Center Solutions products could lead to remote code execution.

A critical flaw in Cisco Unified Communications and Contact Center Solutions products could lead to remote code execution.

Cisco on Wednesday announced patches for a critical-severity vulnerability in multiple Unified Communications and Contact Center Solutions products.

The issue, tracked as CVE-2024-20253 (CVSS score of 9.9), exists because user-provided data is not properly processed when read into memory.

“An attacker could exploit this vulnerability by sending a crafted message to a listening port of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the web services user,” Cisco explains in its advisory.

An attacker able to exploit the security defect to access the OS could gain root access to a vulnerable device, the tech giant says.

The flaw impacts the default configuration of Packaged Contact Center Enterprise, Unified Communications Manager, Unified Communications Manager IM & Presence Service, Unified Communications Manager Session Management Edition, Unified Contact Center Enterprise, Unified Contact Center Express, Unity Connection, and Virtualized Voice Browser.

Cisco has released security updates to address the issue in all affected products and recommends that all customers update to a patched version as soon as possible, noting that no workarounds are available.

However, the company points out that customers can mitigate the bug by implementing access control lists (ACLs) on intermediary devices to separate the vulnerable products from the network.

On Wednesday, Cisco also announced patches for two medium-severity flaws in Business 250 and Business 350 series switches, and in Unity Connection.

Advertisement. Scroll to continue reading.

An access control list (ACL) management security defect in the switches could allow an unauthenticated, remote attacker to bypass protections and cause traffic to drop or be forwarded in an unexpected manner.

Unity Connection, Cisco says, is affected by a cross-site scripting (XSS) bug in the web-based management interface that could lead to the execution of arbitrary script code. An attacker would have to convince a user to click on a malicious link to successfully exploit the flaw.

Cisco says it is not aware of any of these vulnerabilities being exploited in malicious attacks. Additional information on the bugs can be found on Cisco’s security advisories page.

Related: Cisco Patches Critical Vulnerability in Unity Connection Product

Related: Exploitation of Recent Cisco IOS XE Vulnerabilities Spikes

Related: Cisco Patches 27 Vulnerabilities in Network Security Products

Related Content

Vulnerabilities

Cisco patches a high-severity Integrated Management Controller vulnerability for which PoC exploit code is available.

Artificial Intelligence

Cisco announces Hypershield, an AI-native and cloud-native enterprise security solution with a wide range of capabilities.

Data Breaches

Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks.

Network Security

Cisco says it will not release patches for a cross-site scripting vulnerability impacting end-of-life small business routers.

Network Security

Cisco has released patches for multiple IOS and IOS XE software vulnerabilities leading to denial-of-service (DoS).

Vulnerabilities

Cisco releases patches for high-severity denial-of-service and elevation of privilege vulnerabilities in IOS RX software.

Vulnerabilities

High-severity flaws in Cisco Secure Client could lead to code execution and unauthorized remote access VPN sessions.

ICS/OT

Cisco has released an open source PoC tool named Badgerboard designed for improved backplane network visibility for OT. 

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version