Cisco recently released a patch for a new generation of exploits that target some of its recently shipped products (Expressway Series and Cisco TelePresence Video Communication Server (VCS)).
This security flaw leaves these devices susceptible to attacks, leaving them open to widespread vulnerabilities that Cisco promptly addressed by releasing the patch. On successful exploitation of these vulnerabilities, a threat actor can execute arbitrary code.
In total, there are five vulnerabilities, but, among the five, two are critical, and they tracked as:-
These two severe security flaws are related to an arbitrary file write and a command injection flaw in the API and web interfaces of the two that could have serious impacts on affected systems.
While these two critical security bugs were identified by Jason Crowder of the Cisco ASIG (Advanced Security Initiatives Group) during the routine internal security testing.
While other three vulnerabilities are identified in the following products of Cisco:-
- Cisco Identity Services Engine RADIUS Service
- Cisco Ultra Cloud Core
Below we have mentioned all the five vulnerabilities that are detected:-
- CVE-2022-20754: It’s a Cisco Expressway Series and Cisco TelePresence VCS Arbitrary File Write Vulnerability with a CVSS score of 9.0.
- CVE-2022-20755: It’s a Cisco Expressway Series and Cisco TelePresence VCS Command Injection Vulnerability with a CVSS score of 9.0.
- CVE-2022-20665: It’s a Cisco StarOS Command Injection Vulnerability with a CVSS score of 6.0.
- CVE-2022-20756: It’s a Cisco Identity Services Engine RADIUS Service Denial of Service Vulnerability with a CVSS score of 8.6.
- CVE-2022-20762: It’s a Cisco Ultra Cloud Core – Subscriber Microservices Infrastructure Privilege Escalation Vulnerability with a CVSS score of 7.8.
However, Cisco has claimed that they didn’t see any evidence of exploitation of these security flaws. Cisco uncovered these bugs while carrying out their own internal security testing or while fixing the bugs reported by the Technical Assistance Center (TAC).
They played around with the idea that you couldn’t massively hack into devices if the misconfigurations were identified, cleared up, and fixed straight away.