// For flags

CVE-2022-20658

Cisco Unified Contact Center Management Portal and Unified Contact Center Domain Manager Privilege Escalation Vulnerability

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) and Cisco Unified Contact Center Domain Manager (Unified CCDM) could allow an authenticated, remote attacker to elevate their privileges to Administrator. This vulnerability is due to the lack of server-side validation of user permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to a vulnerable system. A successful exploit could allow the attacker to create Administrator accounts. With these accounts, the attacker could access and modify telephony and user resources across all the Unified platforms that are associated to the vulnerable Cisco Unified CCMP. To successfully exploit this vulnerability, an attacker would need valid Advanced User credentials.

Una vulnerabilidad en la interfaz de administración basada en web de Cisco Unified Contact Center Management Portal (Unified CCMP) y Cisco Unified Contact Center Domain Manager (Unified CCDM) podría permitir a un atacante remoto autenticado elevar sus privilegios a la categoría de administrador. Esta vulnerabilidad es debido a una falta de comprobación del lado del servidor de los permisos de usuario. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada a un sistema vulnerable. Una explotación con éxito podría permitir al atacante crear cuentas de administrador. Con estas cuentas, el atacante podría acceder y modificar los recursos de telefonía y de usuario en todas las plataformas Unified que estén asociadas al CCMP vulnerable de Cisco Unified. Para explotar con éxito esta vulnerabilidad, un atacante necesitaría credenciales válidas de Usuario Avanzado

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-01-14 CVE Published
  • 2024-04-06 EPSS Updated
  • 2024-11-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-602: Client-Side Enforcement of Server-Side Security
  • CWE-669: Incorrect Resource Transfer Between Spheres
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Unified Contact Center Express
Search vendor "Cisco" for product "Unified Contact Center Express"
12.0.1
Search vendor "Cisco" for product "Unified Contact Center Express" and version "12.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Unified Contact Center Express
Search vendor "Cisco" for product "Unified Contact Center Express"
12.5.1
Search vendor "Cisco" for product "Unified Contact Center Express" and version "12.5.1"
-
Affected
Cisco
Search vendor "Cisco"
Unified Contact Center Management Portal
Search vendor "Cisco" for product "Unified Contact Center Management Portal"
<= 11.6.1
Search vendor "Cisco" for product "Unified Contact Center Management Portal" and version " <= 11.6.1"
-
Affected