TechStaying Safe: Cisco's Latest Security Patches Target Critical Bugs

Staying Safe: Cisco’s Latest Security Patches Target Critical Bugs

Protect Your System: Cisco Releases Patch for Critical Vulnerabilities in Expressway Series Gateways

In recent news, Cisco has rolled out a patch to address multiple vulnerabilities discovered in the Expressway Series collaboration gateways. The urgency of this update stems from the fact that two of the vulnerabilities are classified as “critical”, posing a serious risk of remote code execution by malicious actors. It is highly recommended to apply these patches promptly to safeguard your system.

The security advisory accompanying the patch highlights the specific vulnerabilities addressed by Cisco, namely CVE-2024-20252 and CVE-2024-20254. These vulnerabilities could be exploited through a deceptive link, potentially granting attackers the ability to manipulate user accounts, execute arbitrary code, elevate privileges, and more. This type of attack falls under the category of “cross-site request forgery (CSRF)”.

Cisco warned users that attackers could leverage these vulnerabilities by tricking API users into clicking on a malicious link. Successful exploitation could result in unauthorized actions being performed with the affected user’s privileges, particularly if the user has administrative access. Such actions may include system configuration modifications and the creation of new privileged accounts.

In addition to the critical vulnerabilities mentioned above, Cisco also addressed CVE-2024-20255, which could enable attackers to alter system configurations and initiate denial of service attacks. It’s crucial to note that these vulnerabilities are only exploitable in Expressway Series instances with default settings, and for CVE-2024-20254, the victim must have the cluster database (CDB) API feature enabled.

It is essential to emphasize that these patches specifically apply to Expressway Series gateways and not to the TelePresence Video Communication Server (VCS) gateway, which ceased receiving support last year. Cisco reassured users that there is no evidence of these vulnerabilities being exploited in the wild, and no proof-of-concepts (PoC) have been identified.

It’s reassuring to know that Cisco is proactively addressing these security concerns and providing patches to mitigate potential risks. Stay informed and protected by signing up for the TechRadar Pro newsletter to receive the latest news, insights, and best practices for ensuring your system’s security.

Author Bio: Sead is an experienced freelance journalist based in Sarajevo, Bosnia and Herzegovina, with a specialization in IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws, and regulations). With over a decade of writing experience, Sead has contributed to various media outlets, including Al Jazeera Balkans, and conducted content writing modules for Represent Communications.

Protect your system from vulnerabilities: stay informed and take proactive measures to enhance your cybersecurity defenses. Learn more about critical security issues and how to safeguard your digital assets. Read the full article on TechRadar Pro for comprehensive insights and recommendations to protect your systems effectively.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe Today

GET EXCLUSIVE FULL ACCESS TO PREMIUM CONTENT

SUPPORT NONPROFIT JOURNALISM

EXPERT ANALYSIS OF AND EMERGING TRENDS IN CHILD WELFARE AND JUVENILE JUSTICE

TOPICAL VIDEO WEBINARS

Get unlimited access to our EXCLUSIVE Content and our archive of subscriber stories.

Exclusive content

Latest article

More article