Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqmx-hq6j-36x9

Опубликовано: 16 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.

EPSS

Процентиль: 97%
0.30117
Средний

6.5 Medium

CVSS3

Дефекты

CWE-77
CWE-94

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость веб-интерфейса управления устройств управления конференц-связью Cisco Expressway Series и Cisco Telepresence VCS, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.30117
Средний

6.5 Medium

CVSS3

Дефекты

CWE-77
CWE-94