Cisco Expressway Series XSRF (cisco-sa-expressway-csrf-KnnZDMj3)

high Nessus Plugin ID 190353

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Expressway Series is affected by multiple vulnerabilities.

- A vulnerability in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks that perform arbitrary actions on an affected device. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details [#details] section of this advisory.
(CVE-2024-20252, CVE-2024-20254)

- A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload. (CVE-2024-20255)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwa25074, CSCwa25099, CSCwa25100

See Also

http://www.nessus.org/u?971fa3eb

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa25074

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa25099

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa25100

Plugin Details

Severity: High

ID: 190353

File Name: cisco-sa-expressway-csrf-KnnZDMj3.nasl

Version: 1.3

Type: remote

Family: CISCO

Published: 2/9/2024

Updated: 7/19/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-20254

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:telepresence_video_communication_server_software, cpe:/h:cisco:telepresence_video_communication_server

Required KB Items: Cisco/TelePresence_VCS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 2/7/2024

Vulnerability Publication Date: 2/7/2024

Reference Information

CVE: CVE-2024-20252, CVE-2024-20254, CVE-2024-20255

CWE: 352

CISCO-SA: cisco-sa-expressway-csrf-KnnZDMj3

IAVA: 2024-A-0076-S

CISCO-BUG-ID: CSCwa25074, CSCwa25099, CSCwa25100