Cisco Expressway Edge Improper Authorization (cisco-sa-expressway-auth-kdFrcZ2j)

medium Nessus Plugin ID 206980

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Expressway Edge Improper Authorization is affected by a vulnerability.

- A vulnerability in Cisco Expressway Edge (Expressway-E) could allow an authenticated, remote attacker to masquerade as another user on an affected system. This vulnerability is due to inadequate authorization checks for Mobile and Remote Access (MRA) users. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to intercept calls that are destined for a particular phone number or to make phone calls and have that phone number appear on the caller ID. To successfully exploit this vulnerability, the attacker must be an MRA user on an affected system. (CVE-2024-20497)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwa25058

See Also

http://www.nessus.org/u?3d8260b9

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa25058

Plugin Details

Severity: Medium

ID: 206980

File Name: cisco-sa-expressway-auth-kdFrcZ2j.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 9/11/2024

Updated: 9/11/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2024-20497

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:telepresence_video_communication_server_software, cpe:/h:cisco:telepresence_video_communication_server

Required KB Items: Cisco/TelePresence_VCS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/4/2024

Vulnerability Publication Date: 9/4/2024

Reference Information

CVE: CVE-2024-20497