A number of Cisco solutions for SMBs suffer from a critical vulnerability that could lead to an RCE attack.
Cisco has issued a warning. The vulnerabilities have received a 9.9 CVSS score. The problem involves failure to process user-supplied data read into memory correctly. Hackers not logged into the Unified Communications Manager (CM) or Contact Center system can send specially customized messages to the “listening port” on vulnerable devices due to the vulnerability. This can be done through desktop phones, for example. Through this port, they can execute code on the underlying operating system with the privileges of the Web services user and/or gain root access.
Consequences of possible attack
The consequences of such an attack are manifold. Consider flattening the communications infrastructure with ransomware and disrupting customer contact. In addition, the hackers can infiltrate IP phones and other endpoints, eavesdrop on conversations, steal data, conduct surveillance for follow-up phishing attacks and more.
Cisco published a list of affected UC&CC solutions and versions and their patches in its security advisory. In addition, the tech giant presented a migration path for companies that cannot update immediately.
This path includes the creation of Access Control Lists (ACLs) for intermediate devices. This allows companies to separate their UC&CC cluster from the rest of the network and only allow access to the ports of these deployed devices.