Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-20793 |
CWE-ID | CWE-325 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco TelePresence Collaboration Endpoint (CE) Hardware solutions / Office equipment, IP-phones, print servers Cisco RoomOS Operating systems & Components / Operating system |
Vendor | Cisco Systems, Inc |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU67958
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-20793
CWE-ID:
CWE-325 - Missing Required Cryptographic Step
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient identity verification in pairing process. A remote user can access the target device while impersonating a legitimate device.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsCisco TelePresence Collaboration Endpoint (CE): 9.14.0
Cisco RoomOS: All versions
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?