Loading HuntDB...

Cisco TelePresence Video Communication Server (VCS) Expressway

79 Versions 10 CVEs

Versions

X8.5.1

OTHER 10 CVEs

X8.9.2

OTHER 10 CVEs

X8.1.1

OTHER 10 CVEs

X8.10.3

OTHER 10 CVEs

X8.1.2

OTHER 10 CVEs

X14.3.3

OTHER 3 CVEs

X14.0.6

OTHER 10 CVEs

X14.3.2

OTHER 6 CVEs

X12.6.0

OTHER 10 CVEs

X12.5.0

OTHER 10 CVEs

X8.7.1

OTHER 10 CVEs

X12.6.2

OTHER 10 CVEs

X14.3.4

OTHER 3 CVEs

X8.1

OTHER 10 CVEs

X14.0.0

OTHER 4 CVEs

X14.2.5

OTHER 7 CVEs

X14.2.6

OTHER 7 CVEs

X8.6

OTHER 10 CVEs

X14.2.7

OTHER 7 CVEs

X8.11.3

OTHER 10 CVEs

X8.6.1

OTHER 10 CVEs

X14.0.2

OTHER 10 CVEs

X8.8.1

OTHER 10 CVEs

X8.9.1

OTHER 10 CVEs

X12.7.0

OTHER 10 CVEs

X14.2.2

OTHER 7 CVEs

X14.3.0

OTHER 7 CVEs

X12.6.1

OTHER 10 CVEs

X8.11.2

OTHER 10 CVEs

X12.5.3

OTHER 10 CVEs

X8.2.2

OTHER 10 CVEs

X8.10.1

OTHER 10 CVEs

X8.5.3

OTHER 10 CVEs

X8.2

OTHER 10 CVEs

X12.5.4

OTHER 10 CVEs

X8.2.1

OTHER 10 CVEs

X14.0.3

OTHER 10 CVEs

X8.10.0

OTHER 10 CVEs

X14.3.1

OTHER 6 CVEs

X15.0.3

OTHER 2 CVEs

X8.7

OTHER 10 CVEs

X14.0.11

OTHER 8 CVEs

X14.2.1

OTHER 8 CVEs

X8.7.3

OTHER 10 CVEs

X15.0.0

OTHER 3 CVEs

X8.11.0

OTHER 10 CVEs

X15.0.2

OTHER 2 CVEs

X14.0.9

OTHER 9 CVEs

X12.5.2

OTHER 10 CVEs

X12.5.9

OTHER 10 CVEs

X14.3.5

OTHER 3 CVEs

X12.6.3

OTHER 10 CVEs

X14.0.8

OTHER 10 CVEs

X8.11.4

OTHER 10 CVEs

X8.8.3

OTHER 10 CVEs

X14.0.7

OTHER 10 CVEs

X15.0.1

OTHER 3 CVEs

X8.8

OTHER 10 CVEs

X8.9

OTHER 10 CVEs

X14.0.4

OTHER 10 CVEs

X8.5

OTHER 10 CVEs

X8.7.2

OTHER 10 CVEs

X8.5.2

OTHER 4 CVEs

X14.0.10

OTHER 8 CVEs

X8.10.2

OTHER 10 CVEs

X12.6.4

OTHER 10 CVEs

X12.5.8

OTHER 10 CVEs

X12.5.5

OTHER 10 CVEs

X12.5.1

OTHER 10 CVEs

X12.5.7

OTHER 10 CVEs

X8.8.2

OTHER 10 CVEs

X14.0.5

OTHER 10 CVEs

X14.0.1

OTHER 10 CVEs

X12.7.1

OTHER 10 CVEs

X14.2.0

OTHER 8 CVEs

X8.10.4

OTHER 10 CVEs

X14.3.6

OTHER 1 CVE

X8.11.1

OTHER 10 CVEs

X12.5.6

OTHER 10 CVEs

Recent CVEs

CVE-2022-20814

A vulnerability in the certificate validation of Cisco Expressway-C and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data.  The vulnerability is due to a lack of validation of the SSL server certificate that an affected device receives when it establishes a connection to a Cisco Unified Communications Manager device. An attacker could exploit this vulnerability by using a man-in-the-middle technique to intercept the traffic between the devices, and then using a self-signed certificate to impersonate the endpoint. A successful exploit could allow the attacker to view the intercepted traffic in clear text or alter the contents of the traffic. Note: Cisco Expressway-E is not affected by this vulnerability.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

HIGH Nov 15, 2024

CVE-2022-20853

A vulnerability in the REST API of Cisco Expressway Series and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. 

HIGH Nov 15, 2024

CVE-2024-20492

A vulnerability in the restricted shell of Cisco Expressway Series could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have Administrator-level credentials with read-write privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a series of crafted CLI commands. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of the affected device. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.

MEDIUM Oct 02, 2024

CVE-2024-20497

A vulnerability in Cisco Expressway Edge (Expressway-E) could allow an authenticated, remote attacker to masquerade as another user on an affected system. This vulnerability is due to inadequate authorization checks for Mobile and Remote Access (MRA) users. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to intercept calls that are destined for a particular phone number or to make phone calls and have that phone number appear on the caller ID. To successfully exploit this vulnerability, the attacker must be an MRA user on an affected system.

MEDIUM Sep 04, 2024

CVE-2024-20400

A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.

MEDIUM Jul 17, 2024

CVE-2024-20255

A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload.

HIGH Feb 07, 2024

CVE-2024-20254

Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks that perform arbitrary actions on an affected device. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.

CRITICAL Feb 07, 2024

CVE-2024-20252

Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks that perform arbitrary actions on an affected device. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.

CRITICAL Feb 07, 2024

CVE-2023-20209

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.

MEDIUM Aug 16, 2023

CVE-2023-20105

A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by authenticating to the application as a Read-only user and sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device.

CRITICAL Jun 28, 2023