Cisco has recently issued patches to rectify a critical security vulnerability affecting Unified Communications and Contact Center Solutions products, presenting a potential risk of arbitrary code execution by an unauthenticated, remote attacker.
Vulnerability Details (CVE-2024-20253)
The flaw, tracked as CVE-2024-20253 with a CVSS score of 9.9, originates from improper processing of user-provided data, allowing threat actors to send specially crafted messages to vulnerable appliances’ listening ports.
Security researcher Julien Egloff from Synacktiv has been credited with discovering and reporting the vulnerability, emphasizing the collaborative efforts to enhance product security.
Impacted Products
The affected products include Unified Communications Manager, Unified Communications Manager IM & Presence Service, Unified Communications Manager Session Management Edition, Unified Contact Center Express, Unity Connection, and Virtualized Voice Browser.
A successful exploit could provide the attacker with arbitrary command execution on the underlying operating system, leveraging the privileges of the web services user. This could potentially lead to gaining root access on the affected device.
Mitigation Measures
While there are no immediate workarounds, Cisco recommends users to promptly apply the provided patches. Additionally, the company suggests implementing access control lists (ACLs) to restrict access in scenarios where immediate updates are not feasible.
This disclosure follows Cisco’s recent efforts to address a critical security flaw in Unity Connection (CVE-2024-20272), highlighting the ongoing commitment to securing its products against potential vulnerabilities.
By issuing these patches and emphasizing proactive security measures, Cisco aims to fortify the resilience of its Unified Communications and Contact Center Solutions, ensuring a robust defense against evolving cybersecurity threats.