CRITICALCVE-2022-20754CVSS 9

Vulnérabilités dans les séries Cisco Expressway et Cisco TelePresence Video Communication Server

Plateforme

cisco

Composant

cisco-telepresence-video-communication-server-vcs-expressway

AI Confidence: highNVDEPSS 1.1%Révisé: mai 2026
Traduction vers votre langue…

CVE-2022-20754 describes multiple vulnerabilities within the API and web-based management interfaces of Cisco TelePresence Video Communication Server (VCS) Expressway. An authenticated, remote attacker possessing read/write privileges to the application can exploit these flaws to write files or execute arbitrary code on the underlying operating system, escalating privileges to root. Affected versions include those prior to a patch release, and immediate action is required to mitigate the risk.

Impact et Scénarios d'Attaquetraduction en cours…

The impact of CVE-2022-20754 is severe. Successful exploitation allows an attacker to gain root access to the Cisco Expressway device, effectively granting them complete control over the system. This includes the ability to modify system configurations, install malicious software, steal sensitive data, and potentially pivot to other systems on the network. Given the critical nature of the vulnerability and the potential for remote code execution, this represents a significant security risk. The ability to write files allows for persistence and the potential to establish a backdoor for future access. This vulnerability shares similarities with other privilege escalation exploits where attackers leverage application vulnerabilities to gain root access.

Contexte d'Exploitationtraduction en cours…

CVE-2022-20754 is a critical vulnerability with potential for widespread exploitation. Public proof-of-concept code is currently unavailable, but the severity and ease of exploitation (requiring only authenticated access) suggest a high probability of exploitation. The vulnerability was publicly disclosed on April 6, 2022. It is recommended to monitor security advisories and threat intelligence feeds for any signs of active exploitation campaigns. The NVD entry was published on the same date.

Qui Est à Risquetraduction en cours…

Organizations heavily reliant on Cisco TelePresence VCS Expressway for video conferencing and collaboration are at significant risk. This includes large enterprises, educational institutions, and government agencies. Specifically, deployments with weak password policies or overly permissive access controls to the Expressway management interfaces are particularly vulnerable. Shared hosting environments utilizing Cisco Expressway are also at increased risk due to the potential for cross-tenant exploitation.

Étapes de Détectiontraduction en cours…

• linux / server:

journalctl -u expressway | grep -i "error" -i "exception"

• cisco:

show running-config | grep -i expressway

• generic web:

curl -I https://<expressway_ip>/admin/api/v1/  # Check for exposed API endpoints

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

1.08% (percentile 78%)

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L9.0CRITICALAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredHighNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeChangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityLowRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Élevé — un compte administrateur ou privilégié est requis.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Modifié — l'attaque peut pivoter au-delà du composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Faible — déni de service partiel ou intermittent.

Logiciel Affecté

Composantcisco-telepresence-video-communication-server-vcs-expressway
FournisseurCisco
Plage affectéeCorrigé dans
n/a – n/a

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour
Sans correctif — 1509 jours depuis la divulgation

Mitigation et Contournementstraduction en cours…

Due to the lack of a specified 'fixed_in' version, immediate mitigation strategies are crucial. Cisco recommends reviewing the advisory for potential workarounds and configuration changes that may limit the attack surface. Implement strict access controls to the Expressway management interfaces, limiting access to only authorized personnel. Consider using a Web Application Firewall (WAF) to filter malicious requests targeting the vulnerable APIs. Monitor system logs for suspicious activity, particularly attempts to write files or execute commands. Regularly audit user accounts and permissions to ensure least privilege access is enforced. After applying any configuration changes or implementing WAF rules, verify the effectiveness by attempting to reproduce the vulnerability in a test environment.

Comment corriger

Mettez à jour les séries Cisco Expressway et Cisco TelePresence Video Communication Server (VCS) Expressway vers une version corrigée conformément aux recommandations de Cisco. Consultez l'avis de sécurité de Cisco pour obtenir des détails spécifiques sur les versions affectées et les versions de logiciel recommandées.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2022-20754 — RCE in Cisco TelePresence VCS Expressway?

CVE-2022-20754 is a critical vulnerability in Cisco TelePresence VCS Expressway that allows authenticated attackers to execute arbitrary code as root, potentially leading to full system compromise.

Am I affected by CVE-2022-20754 in Cisco TelePresence VCS Expressway?

If you are running a version of Cisco TelePresence VCS Expressway prior to the patch release, you are potentially affected. Check Cisco's advisory for specific affected versions.

How do I fix CVE-2022-20754 in Cisco TelePresence VCS Expressway?

Upgrade to a patched version of Cisco TelePresence VCS Expressway as soon as it becomes available. Until then, implement mitigation strategies such as access control restrictions and WAF rules.

Is CVE-2022-20754 being actively exploited?

While no active exploitation has been publicly confirmed, the vulnerability's severity and ease of exploitation suggest a high probability of exploitation. Monitor security advisories and threat intelligence feeds.

Where can I find the official Cisco advisory for CVE-2022-20754?

Refer to the official Cisco Security Advisory for detailed information: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-multiple-vulnerabilities

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.