Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems

    justmattgBy justmattgJanuary 27, 2024No Comments2 Mins Read

    [ad_1]

    Jan 26, 2024NewsroomNetwork Security / Vulnerability

    Cisco

    Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact Center Solutions products that could permit an unauthenticated, remote attacker to execute arbitrary code on an affected device.

    Tracked as CVE-2024-20253 (CVSS score: 9.9), the issue stems from improper processing of user-provided data that a threat actor could abuse to send a specially crafted message to a listening port of a susceptible appliance.

    “A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the web services user,” Cisco said in an advisory. “With access to the underlying operating system, the attacker could also establish root access on the affected device.”

    Cybersecurity

    Synacktiv security researcher Julien Egloff has been credited with discovering and reporting CVE-2024-20253. The following products are impacted by the flaw –

    • Unified Communications Manager (versions 11.5, 12.5(1), and 14)
    • Unified Communications Manager IM & Presence Service (versions 11.5(1), 12.5(1), and 14)
    • Unified Communications Manager Session Management Edition (versions 11.5, 12.5(1), and 14)
    • Unified Contact Center Express (versions 12.0 and earlier and 12.5(1))
    • Unity Connection (versions 11.5(1), 12.5(1), and 14), and
    • Virtualized Voice Browser (versions 12.0 and earlier, 12.5(1), and 12.5(2))

    While there are no workarounds that address the shortcoming, the networking equipment maker is urging users to set up access control lists to limit access where applying the updates is not immediately possible.

    Cybersecurity

    “Establish access control lists (ACLs) on intermediary devices that separate the Cisco Unified Communications or Cisco Contact Center Solutions cluster from users and the rest of the network to allow access only to the ports of deployed services,” the company said.

    The disclosure arrives weeks after Cisco shipped fixes for a critical security flaw impacting Unity Connection (CVE-2024-20272, CVSS score: 7.3) that could permit an adversary to execute arbitrary commands on the underlying system.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleRussian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree
    Next Article AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑