Cisco Unified Communications Manager (UCM) is one of the more popular enterprise telephony solutions in the market, and it recently experienced a major security vulnerability (CVE-2023-20010). The attack, dubbed "UCMbleed" by researchers from researchers from RiskSense, could allow an attacker to remotely execute malicious code on the UCM system by exploiting a directory traversal vulnerability in the web-based administration interface. The vulnerability, which was discovered in July 2019, could allow an attacker to take control of the system, with the potential to cause significant disruption.
The vulnerability affects both Cisco UCM versions 10.0 and 12.5.1, and was reported in a public advisory released by Cisco in October 2019. The vulnerability allowed attackers to remotely execute code with root privileges and gain access to the system. According to the advisory, the vulnerability was due to "insufficient input validation of path traversal and command injection parameters."
The vulnerability was patched in the latest update of the UCM software, version 12.5.2. Cisco also issued a security patch for Version 10.0 of the product.
It is important for organizations that are using type of enterprise telephony system to remain vigilant about security. Organizations should regularly check for security patch updates, and apply the necessary fixes to ensure that their systems are secure.
This Cyber News was published on securityaffairs.com. Publication date: Mon, 23 Jan 2023 08:46:03 +0000