Cisco Resolves Critical Unity Connection Vulnerability Allowing Root Privilege Escalation

by | Jan 11, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Cisco has promptly addressed a critical security vulnerability in its Unity Connection software, a fully virtualized messaging and voicemail solution catering to a variety of communication platforms. The flaw, identified as CVE-2024-20272, was discovered in the software’s web-based management interface, posing a potential risk that could allow unauthenticated attackers to gain remote root privileges on unpatched devices.

The vulnerability arises from a lack of authentication in a specific API and improper validation of user-supplied data, enabling attackers to execute commands on the underlying operating system by uploading arbitrary files to vulnerable systems. Cisco explains, “A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.”

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Cisco’s Product Security Incident Response Team (PSIRT) has confirmed that there is currently no evidence of public proof-of-concept exploits for this vulnerability or active exploitation in the wild.

Cisco Unity Connection ReleaseFirst Fixed Release
12.5 and earlier12.5.1.19017-4
1414.0.1.14006-5
15Not vulnerable

 

In addition to addressing the Unity Connection flaw, Cisco has also released patches for ten medium-severity security vulnerabilities across various products. These patches address issues such as privilege escalation, cross-site scripting (XSS) attacks, and command injection vulnerabilities. Notably, one of these flaws, tracked as CVE-2024-20287 in the web-based management interface of Cisco’s WAP371 Wireless Access Point, comes with available proof-of-concept exploit code online.

Despite this, Cisco has announced that it will not release firmware updates to patch the CVE-2024-20287 security flaw, as the Cisco WAP371 device reached end-of-life in June 2019. The company advises customers with a WAP371 device on their network to migrate to the Cisco Business 240AC Access Point.




These security measures follow Cisco’s recent response to zero-day vulnerabilities (CVE-2023-20198 and CVE-2023-20273) exploited to compromise over 50,000 IOS XE devices within a single week in October. Cisco continues to prioritize the security of its products and urges users to apply the necessary patches and updates to mitigate potential risks.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This