Virtual conference

Cisco fixes virtual conferencing software vulnerability reported by NSA

Cisco on Wednesday announced the release of patches for several high-severity vulnerabilities in its products, including a bug reported by the National Security Agency (NSA).

Tracked as CVE-2022-20783 (CVSS score of 7.5), the flaw reported by the NSA is a denial of service (DoS) issue in TelePresence Collaboration Endpoint (CE) and RoomOS software, which could be exploited remotely , without authentication.

Insufficient input validation, Cisco explains, allows an attacker to send specially crafted H.323 traffic to a vulnerable device and cause it to restart, either normally or in maintenance mode, creating a DoS condition.

Cisco patched the security vulnerability with versions and of TelePresence CE and with the January 2022 version of RoomOS.

Another high-severity vulnerability that Cisco addressed this week is CVE-2022-20732 (CVSS score of 7.8), which is described as an elevation of privilege issue in the Virtualized Infrastructure Manager (VIM) product from Cisco. business.

Incorrect access permissions in VIM allow an authenticated local attacker to access specific configuration files that they should not have access to. The attacker could then obtain the credentials of the internal database and use them to view and modify the contents of the database.

“The attacker could use this database access to elevate privileges on the affected device,” Cisco explains.

The vulnerability was addressed with the release of Virtualized Infrastructure Manager software version 4.2.2. If updating to a patched version is not possible, users should log in to the device’s CLI as root and secure permissions to the affected files, the tech giant notes in its advisory.

This week, Cisco also removed a static SSH host key in Umbrella Virtual Appliance (VA) version 3.3.2, which could be exploited by an unauthenticated remote attacker to impersonate a VA.

“An attacker could exploit this vulnerability by performing a man-in-the-middle attack on an SSH connection to Umbrella VA. A successful exploit could allow the attacker to learn the credentials of the administrator, change configurations, or reload the AV,” Cisco explains.

Cisco too fixed About ten medium-severity vulnerabilities this week, including Cross-Site Scripting (XSS), Arbitrary File Reading, File Decryption Bypass, DoS, SQL Injection, and Cross-Site Request Forgery (CSRF) bugs.

Related: CISA Says Recent Cisco Router Vulnerabilities Are Being Exploited in Attacks

Related: NSA Notifies Cisco of Vulnerability Exposing Nexus Switches to DoS Attacks

Related: Cisco Patches Critical Vulnerabilities in Expressway, TelePresence VCS Products

Ionut Argire is an international correspondent for SecurityWeek.

Previous columns by Ionut Arghire: