Cisco announced on Wednesday that it has patched potentially serious vulnerabilities in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence.
The company has informed customers that its Expressway series and TelePresence Video Communication Server software is affected by two high-severity vulnerabilities.
One of them, tracked as CVE-2022-20814 and related to improper certificate validation, can allow a remote, unauthenticated attacker to access sensitive data through a man-in-the-middle attack. Successful exploitation of the flaw can result in the attacker intercepting or altering traffic.
The second issue, CVE-2022-20853, allows cross-site request forgery (CSRF) attacks, enabling an attacker to cause a denial of service (DoS) condition by getting a user to click on a specially crafted link.
In the case of the Enterprise NFV Infrastructure Software (NFVIS), Cisco has fixed a high-severity issue related to the signature of upgrade files not being properly checked (CVE-2022-20929).
“An attacker could exploit this vulnerability by providing an administrator with an unauthentic upgrade file. A successful exploit could allow the attacker to fully compromise the Cisco NFVIS system,” Cisco said.
The company has also released security advisories addressing medium-severity vulnerabilities in Smart Software Manager On-Prem, Jabber, BroadWorks, ATA, Touch 10, Secure Web Appliance, and multiple access points.
The networking giant says it’s not aware of any malicious attacks exploiting these vulnerabilities.
Related: Cisco Patches Severe Vulnerabilities in Nexus Dashboard
Related: Cisco Patches High-Severity Vulnerability in Security Solutions
Related: Cisco Patches 11 High-Severity Vulnerabilities in Security Products