• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2021-39032 – IBM Sterling Gentran: Server for Windows
January 17, 2022
Rewterz Threat Advisory – Multiple Juniper Networks Junos OS Vulnerabilities
January 17, 2022

Rewterz Threat Advisory – Multiple Cisco Products Vulnerabilities

January 17, 2022

Severity

Medium

Analysis Summary

CVE-2022-20631; CVE-2022-20632 

Cisco Enterprise Chat and Email is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the web-based management interface. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

CVE-2022-20633

Cisco Enterprise Chat and Email could allow a remote attacker to obtain sensitive information, caused by differences in authentication responses in the web-based management interface. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to confirm existing user accounts.

CVE-2022-20634 

Cisco Enterprise Chat and Email could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in web-based management interface. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites.

CVE-2022-20660 

Cisco IP Phones could allow a local attacker to obtain sensitive information, caused by unencrypted storage of confidential information. By physically extracting and accessing one of the flash memory chips, an attacker could exploit this vulnerability to obtain confidential information.

CVE-2022-20635; CVE-2022-20636; CVE-2022-20637; CVE-2022-20638; CVE-2022-20639; CVE-2022-20640; CVE-2022-20641; CVE-2022-20642; CVE-2022-20643; CVE-2022-20644; CVE-2022-20645; CVE-2022-20646; CVE-2022-20647

Cisco Security Manager is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the web-based management interface. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

Impact

  • Cross-Site Scripting
  • Information Disclosure
  • Security Bypass

Affected Vendors

Cisco

Affected Products

  • Cisco Enterprise Chat and Email
  • Cisco Unified IP Phone 7945g
  • Cisco Unified IP Phone 7965g
  • Cisco Unified IP Phone 7975g
  • Cisco Unified SIP Phone 3905
  • Cisco Security Manager

Remediation

Refer to Cisco Security Advisory for patch, upgrade, or suggested workaround information.

Cisco Enterprise Chat and Email:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR

Cisco IP Phones:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA

Cisco Security Manager:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.