Cisco Addresses Apache Struts 2 Critical RCE Vulnerability - 20231214001¶
Overview¶
Since the release of Advisory 20231213001, Cisco have released a public advisory regarding the Apache Struts vulnerability affecting Cisco Products.
Cisco is investigating its product line to determine which products may be affected by this vulnerability and the impact on each affected product. As the investigation progresses, Cisco will update their advisory with information about affected products.
What is the vulnerability?¶
CVE ID | CVSS Score | Overview |
---|---|---|
CVE-2023-50164 | 9.8 | An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. |
What is vulnerable?¶
Only products listed in the Vulnerable Products section of the advisory are known to be affected by this vulnerability
Usage | Product |
---|---|
Collaboration and Social Media | Customer Collaboration Platform, formerly SocialMiner |
Network and Content Security Devices | Identity Services Engine (ISE) |
Network Management and Provisioning | Prime Access Registrar |
Prime Collaboration Assurance | |
Prime Collaboration Provisioning | |
Prime License Manager | |
Prime Service Catalog | |
Voice and Unified Communications Devices | Computer Telephony Integration Object Server (CTIOS) |
Emergency Responder | |
Finesse | |
Unified Communications Manager (Unified CM) / Unified Communications Manager Session Management Edition (Unified CM SME) | |
Unified Communications Manager IM & Presence Service (Unified CM IM&P) | |
Unified Contact Center Enterprise (Unified CCE) | |
Unified Contact Center Enterprise - Live Data server (Unified CCE - Live Data Server) | |
Unified Contact Center Express (Unified CCX) | |
Unified Intelligence Center | |
Unified Intelligent Contact Management Enterprise | |
Unified SIP Proxy Software | |
Unity Connection | |
Virtualized Voice Browser |
What has been observed?¶
The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.
Recommendation¶
The WA SOC recommends administrators apply the workarounds and solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):