A vital safety vulnerability in Cisco’s BroadWorks unified collaboration and messaging platform may pave the way in which for full takeover of the platform, and the theft of a raft of delicate information.
BroadWorks is an all-in-one unified communications as a service (UCaaS) platform that features VoIP calling, on the spot messaging, video calling, WebEx integration, and extra. It is considered one of Cisco’s flagship choices and enjoys dominant market share, with thousands and thousands of enterprise seats signed up throughout enterprises and small and midsize companies (SMBs) alike.
The bug (CVE-2023-20238), which exists in some implementations of the BroadWorks Software Supply Platform and the BroadWorks Xtended Providers Platform particularly, carries a ten out of 10 on the CVSS vulnerability-severity scale.
In keeping with an official advisory, cyberattackers wielding a legitimate BroadWorks consumer ID can exploit the platform’s single sign-on (SSO) implementation to authenticate as an current consumer. From there, they might hijack communications, listen in on delicate communications, ship fraudulent messages, phish data from different inner customers, make cellphone requires toll fraud functions, trigger denial-of-service (DoS), and extra.
“This vulnerability is as a result of technique used to validate SSO tokens,” in response to the networking big. “A profitable exploit may enable the attacker to [take actions at the] privilege degree of the cast account … If that account is an administrator account, the attacker would have the power to view confidential data, modify buyer settings, or modify settings for different customers.”
Cisco has patched CVE-2023-20238 in AP.platform.23.0.1075.ap385341 and within the 2023.06_1.333 and 2023.07_1.332 launch unbiased variations.