Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20497", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.686Z", "datePublished": "2024-09-04T16:29:13.595Z", "dateUpdated": "2024-09-04T17:33:38.771Z"}, "containers": {"cna": {"title": "Cisco Expressway Edge Improper Authorization Vulnerability", "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE"}}], "descriptions": [{"lang": "en", "value": "A vulnerability in Cisco Expressway Edge (Expressway-E) could allow an authenticated, remote attacker to masquerade as another user on an affected system.\r\n\r\nThis vulnerability is due to inadequate authorization checks for Mobile and Remote Access (MRA) users. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to intercept calls that are destined for a particular phone number or to make phone calls and have that phone number appear on the caller ID. To successfully exploit this vulnerability, the attacker must be an MRA user on an affected system."}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-auth-kdFrcZ2j", "name": "cisco-sa-expressway-auth-kdFrcZ2j"}], "exploits": [{"lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-expressway-auth-kdFrcZ2j", "discovery": "INTERNAL", "defects": ["CSCwa25058"]}, "problemTypes": [{"descriptions": [{"lang": "en", "description": "Improper Authorization", "type": "cwe", "cweId": "CWE-285"}]}], "affected": [{"vendor": "Cisco", "product": "Cisco TelePresence Video Communication Server (VCS) Expressway", "versions": [{"version": "X8.11.2", "status": "affected"}, {"version": "X8.6", "status": "affected"}, {"version": "X8.11.3", "status": "affected"}, {"version": "X8.2.2", "status": "affected"}, {"version": "X8.8.3", "status": "affected"}, {"version": "X8.11.0", "status": "affected"}, {"version": "X12.5.2", "status": "affected"}, {"version": "X8.1.1", "status": "affected"}, {"version": "X8.9", "status": "affected"}, {"version": "X12.5.1", "status": "affected"}, {"version": "X12.5.6", "status": "affected"}, {"version": "X8.7.3", "status": "affected"}, {"version": "X12.6.0", "status": "affected"}, {"version": "X8.11.1", "status": "affected"}, {"version": "X8.5", "status": "affected"}, {"version": "X8.9.1", "status": "affected"}, {"version": "X8.10.2", "status": "affected"}, {"version": "X8.8.2", "status": "affected"}, {"version": "X8.5.3", "status": "affected"}, {"version": "X8.1", "status": "affected"}, {"version": "X8.9.2", "status": "affected"}, {"version": "X8.11.4", "status": "affected"}, {"version": "X12.5.4", "status": "affected"}, {"version": "X8.8.1", "status": "affected"}, {"version": "X8.2.1", "status": "affected"}, {"version": "X8.5.1", "status": "affected"}, {"version": "X8.6.1", "status": "affected"}, {"version": "X8.1.2", "status": "affected"}, {"version": "X8.8", "status": "affected"}, {"version": "X8.10.0", "status": "affected"}, {"version": "X12.5.3", "status": "affected"}, {"version": "X8.10.1", "status": "affected"}, {"version": "X12.5.7", "status": "affected"}, {"version": "X8.10.3", "status": "affected"}, {"version": "X8.7.1", "status": "affected"}, {"version": "X8.2", "status": "affected"}, {"version": "X12.5.8", "status": "affected"}, {"version": "X8.7", "status": "affected"}, {"version": "X8.5.2", "status": "affected"}, {"version": "X12.5.9", "status": "affected"}, {"version": "X12.5.0", "status": "affected"}, {"version": "X8.10.4", "status": "affected"}, {"version": "X8.7.2", "status": "affected"}, {"version": "X12.5.5", "status": "affected"}, {"version": "X12.6.1", "status": "affected"}, {"version": "X12.6.2", "status": "affected"}, {"version": "X12.6.3", "status": "affected"}, {"version": "X12.6.4", "status": "affected"}, {"version": "X12.7.0", "status": "affected"}, {"version": "X12.7.1", "status": "affected"}, {"version": "X14.0.0", "status": "affected"}, {"version": "X14.0.1", "status": "affected"}, {"version": "X14.0.2", "status": "affected"}, {"version": "X14.0.3", "status": "affected"}, {"version": "X14.0.4", "status": "affected"}, {"version": "X14.0.5", "status": "affected"}, {"version": "X14.0.6", "status": "affected"}, {"version": "X14.0.7", "status": "affected"}, {"version": "X14.0.8", "status": "affected"}, {"version": "X14.2.0", "status": "affected"}, {"version": "X14.0.9", "status": "affected"}, {"version": "X14.2.1", "status": "affected"}, {"version": "X14.2.2", "status": "affected"}, {"version": "X14.0.11", "status": "affected"}, {"version": "X14.2.5", "status": "affected"}, {"version": "X14.0.10", "status": "affected"}, {"version": "X14.2.6", "status": "affected"}, {"version": "X14.2.7", "status": "affected"}, {"version": "X14.3.0", "status": "affected"}, {"version": "X14.3.1", "status": "affected"}, {"version": "X14.3.2", "status": "affected"}, {"version": "X14.3.3", "status": "affected"}, {"version": "X15.0.0", "status": "affected"}, {"version": "X14.3.4", "status": "affected"}, {"version": "X14.3.5", "status": "affected"}, {"version": "X15.0.1", "status": "affected"}, {"version": "X15.0.2", "status": "affected"}, {"version": "X15.0.3", "status": "affected"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-09-04T16:29:13.595Z"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-04T17:33:31.143271Z", "id": "CVE-2024-20497", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-04T17:33:38.771Z"}}]}}