Cisco Expressway-C SSL Cert Validation Flaw Enables MITM
CVE-2022-20814 Published on November 15, 2024
Cisco Expressway Series and Cisco TelePresence VCS Improper Certificate Validation Vulnerability
A vulnerability in the certificate validation of Cisco Expressway-C and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data. The vulnerability is due to a lack of validation of the SSL server certificate that an affected device receives when it establishes a connection to a Cisco Unified Communications Manager device. An attacker could exploit this vulnerability by using a man-in-the-middle technique to intercept the traffic between the devices, and then using a self-signed certificate to impersonate the endpoint. A successful exploit could allow the attacker to view the intercepted traffic in clear text or alter the contents of the traffic.
Note: Cisco Expressway-E is not affected by this vulnerability.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerability Analysis
CVE-2022-20814 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Improper Certificate Validation
The software does not validate, or incorrectly validates, a certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
Products Associated with CVE-2022-20814
Want to know whenever a new CVE is published for Cisco Telepresence Video Communication Server? stack.watch will email you.
Affected Versions
Cisco TelePresence Video Communication Server (VCS) Expressway:- Version X8.11.2 is affected.
- Version X8.6 is affected.
- Version X8.11.3 is affected.
- Version X8.2.2 is affected.
- Version X8.8.3 is affected.
- Version X8.11.0 is affected.
- Version X12.5.2 is affected.
- Version X8.1.1 is affected.
- Version X8.9 is affected.
- Version X12.5.1 is affected.
- Version X12.5.6 is affected.
- Version X8.7.3 is affected.
- Version X12.6.0 is affected.
- Version X8.11.1 is affected.
- Version X8.5 is affected.
- Version X8.9.1 is affected.
- Version X8.10.2 is affected.
- Version X8.8.2 is affected.
- Version X8.5.3 is affected.
- Version X8.1 is affected.
- Version X8.9.2 is affected.
- Version X8.11.4 is affected.
- Version X12.5.4 is affected.
- Version X8.8.1 is affected.
- Version X8.2.1 is affected.
- Version X8.5.1 is affected.
- Version X8.6.1 is affected.
- Version X8.1.2 is affected.
- Version X8.8 is affected.
- Version X8.10.0 is affected.
- Version X12.5.3 is affected.
- Version X8.10.1 is affected.
- Version X12.5.7 is affected.
- Version X8.10.3 is affected.
- Version X8.7.1 is affected.
- Version X8.2 is affected.
- Version X12.5.8 is affected.
- Version X8.7 is affected.
- Version X8.5.2 is affected.
- Version X12.5.9 is affected.
- Version X12.5.0 is affected.
- Version X8.10.4 is affected.
- Version X8.7.2 is affected.
- Version X12.5.5 is affected.
- Version X12.6.1 is affected.
- Version X12.6.2 is affected.
- Version X12.6.3 is affected.
- Version X12.6.4 is affected.
- Version X12.7.0 is affected.
- Version X12.7.1 is affected.
- Version X14.0.0 is affected.
- Version X14.0.1 is affected.
- Version X14.0.2 is affected.
- Version X14.0.3 is affected.
- Version X14.0.4 is affected.
- Version X14.0.5 is affected.
- Version X14.0.6 is affected.
- Version X14.0.7 is affected.
- Version X14.0.8 is affected.
- Version X14.0.9 is affected.
- Before 14.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.