Cisco Resolves Critical Unity Connection Vulnerability Allowing Root Privilege Escalation
Cisco has promptly addressed a critical security vulnerability in its Unity Connection software, a fully virtualized messaging and voicemail solution catering to a variety of communication platforms. The flaw, identified as CVE-2024-20272, was discovered in the software’s web-based management interface, posing a potential risk that could allow unauthenticated attackers to gain remote root privileges on unpatched devices.
The vulnerability arises from a lack of authentication in a specific API and improper validation of user-supplied data, enabling attackers to execute commands on the underlying operating system by uploading arbitrary files to vulnerable systems. Cisco explains, “A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.”
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Cisco’s Product Security Incident Response Team (PSIRT) has confirmed that there is currently no evidence of public proof-of-concept exploits for this vulnerability or active exploitation in the wild.
Cisco Unity Connection Release | First Fixed Release |
---|---|
12.5 and earlier | 12.5.1.19017-4 |
14 | 14.0.1.14006-5 |
15 | Not vulnerable |
In addition to addressing the Unity Connection flaw, Cisco has also released patches for ten medium-severity security vulnerabilities across various products. These patches address issues such as privilege escalation, cross-site scripting (XSS) attacks, and command injection vulnerabilities. Notably, one of these flaws, tracked as CVE-2024-20287 in the web-based management interface of Cisco’s WAP371 Wireless Access Point, comes with available proof-of-concept exploit code online.
Despite this, Cisco has announced that it will not release firmware updates to patch the CVE-2024-20287 security flaw, as the Cisco WAP371 device reached end-of-life in June 2019. The company advises customers with a WAP371 device on their network to migrate to the Cisco Business 240AC Access Point.
Trending: Offensive Security Tool: SessionProbe
Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?
If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com