Saturday, June 21, 2025
HomeTechnologyRoot Access Vulnerability Found in Cisco's Unity Connection Can Be Exploited by...

Root Access Vulnerability Found in Cisco’s Unity Connection Can Be Exploited by Attackers

Cisco has patched a crucial Unity Connection safety flaw that may let unauthenticated attackers remotely acquire root privileges on unpatched units.

Unity Connection is a completely virtualized messaging and voicemail answer for electronic mail inboxes, net browsers, Cisco Jabber, Cisco Unified IP Phone, smartphones, or tablets with excessive availability and redundancy help.

The vulnerability (CVE-2024-20272) was discovered within the software program’s web-based administration interface, and it permits attackers to execute instructions on the underlying working system by importing arbitrary recordsdata to focused and susceptible methods.

“This vulnerability is because of an absence of authentication in a particular API and improper validation of user-supplied information. An attacker may exploit this vulnerability by importing arbitrary recordsdata to an affected system,” Cisco explains.

“A profitable exploit may permit the attacker to retailer malicious recordsdata on the system, execute arbitrary instructions on the working system, and elevate privileges to root.”

Luckily, Cisco’s Product Security Incident Response Team (PSIRT) stated the corporate has no proof of public proof of idea exploits for this vulnerability or lively exploitation within the wild.

Cisco Unity Connection Release First Fixed Release
12.5 and earlier 12.5.1.19017-4
14 14.0.1.14006-5
15 Not susceptible

Command injection flaw with PoC exploit

The firm says that proof-of-concept exploit code is obtainable on-line for one in all these flaws, a command injection vulnerability tracked as CVE-2024-20287 within the web-based administration interface of Cisco’s WAP371 Wireless Access Point.

However, though attackers may exploit this bug to execute arbitrary instructions with root privileges on unpatched units, administrative credentials are additionally required for profitable exploitation.

Cisco says it won’t launch firmware updates to patch the CVE-2024-20287 safety flaw as a result of the Cisco WAP371 gadget reached end-of-life in June 2019.

The firm advises prospects with a WAP371 gadget on their community emigrate to the Cisco Business 240AC Access Point.

In October, Cisco additionally patched two zero-days (CVE-2023-20198 and CVE-2023-20273) exploited to hack over 50,000 IOS XE units inside a single week

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular