// For flags

CVE-2020-3197

Cisco Meetings App Missing TURN Server Credentials Expiration Vulnerability

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the API subsystem of Cisco Meetings App could allow an unauthenticated, remote attacker to retain and reuse the Traversal Using Relay NAT (TURN) server credentials that are configured in an affected system. The vulnerability is due to insufficient protection mechanisms for the TURN server credentials. An attacker could exploit this vulnerability by intercepting the legitimate traffic that is generated by an affected system. An exploit could allow the attacker to obtain the TURN server credentials, which the attacker could use to place audio/video calls and forward packets through the configured TURN server. The attacker would not be able to take control of the TURN server unless the same credentials were used in multiple systems.

Una vulnerabilidad en el subsistema API de Cisco Meetings App podría permitir a un atacante remoto no autenticado retener y reutilizar las credenciales del servidor Traversal Using Relay NAT (TURN) que están configuradas sobre un sistema afectado. La vulnerabilidad es debido a mecanismos de protección insuficientes para las credenciales del servidor TURN. Un atacante podría explotar esta vulnerabilidad al interceptar el tráfico legítimo generado por un sistema afectado. Un explotación podría permitir a un atacante obtener las credenciales del servidor TURN, que el atacante podría usar para colocar llamadas de audio y video y reenviar paquetes a través del servidor TURN configurado. El atacante no será capaz de tomar el control del servidor TURN a menos que sean usadas las mismas credenciales en varios sistemas

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-07-16 CVE Published
  • 2023-07-20 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Meeting Server
Search vendor "Cisco" for product "Meeting Server"
*-
Affected