Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability

cisco-sa-roomos-infodisc-YOTz9Ct7 · Medium · Published · Updated

A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. This vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII). Note: To access the logs that are stored in the RoomOS Cloud, an attacker would need valid Administrator-level credentials. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-infodisc-YOTz9Ct7

Cisco advisory · CSAF JSON

Workarounds

There is a workaround that addresses this vulnerability. Administrators can disable extended logging mode it by completing the following steps:

Choose the Cisco device name or address.
For all products except Board Pro, Desk Mini, and Desk Hub, it is at the top of the interface.
For Board Pro and Desk Mini, swipe in from the right to open the Control Panel.
For Desk Hub, tap the controls icon in the upper right corner to open the Control Panel.

Choose Device settings (Board Pro, Desk Mini, or Desk Hub) or Settings (other products).
Open Issues and diagnostics and find the extended logging toggle button and turn it off.

While this workaround has proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2022-20768
Cisco Bug IDsCSCwa87973
CVSS ScoreBase 4.9
Base 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco RoomOS Software, Cisco TelePresence Endpoint Software (TC/CE)

Related Products

Product CVE Evidence
Cisco TelePresence Endpoint Software (TC/CE) CVE-2022-20768 Cisco OpenVuln
Cisco TelePresence CVE-2022-20768 Cisco OpenVuln
Cisco RoomOS Software CVE-2022-20768 Cisco OpenVuln