• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Mirai Botnet – Active IOCs
January 19, 2022
Rewterz Threat Advisory – Multiple F5 BIG-IP Vulnerabilities
January 20, 2022

Rewterz Threat Advisory – Cisco Webex Meetings and Redundancy Configuration Manager Vulnerabilities

January 20, 2022

Severity

Medium

Analysis Summary

CVE-2022-20654 

Cisco Webex Meetings for Android is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A local attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

CVE-2022-20648 

Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow a remote attacker to obtain sensitive information, caused by a debug service that incorrectly listens to and accepts incoming connections. By connecting to the debug port and executing debug commands, an attacker could exploit this vulnerability to view sensitive debugging information.

CVE-2022-20649 

Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow a remote attacker to execute arbitrary commands on the system, caused by an error when the debug mode is incorrectly enabled for specific services. By connecting to the device and navigating to the service with debug mode enabled, an attacker could exploit this vulnerability to execute arbitrary commands on the system with root-level privileges in the context of the configured container.

Impact

  • Cross-Site Scripting
  • Information Disclosure
  • Command Execution

Affected Vendors

Cisco

Affected Products

  • Cisco Webex Meetings
  • Cisco Redundancy Configuration Manager for Cisco StarOS Software

Remediation

Refer to Cisco Security Advisory for patch, upgrade, or suggested workaround information.

CVE-2022-20654

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe

CVE-2022-20648

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq

CVE-2022-20649

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.