CVE Vulnerabilities

CVE-2022-20658

Client-Side Enforcement of Server-Side Security

Published: Jan 14, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.6
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSS 2.x
8.5 HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:N
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) and Cisco Unified Contact Center Domain Manager (Unified CCDM) could allow an authenticated, remote attacker to elevate their privileges to Administrator. This vulnerability is due to the lack of server-side validation of user permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to a vulnerable system. A successful exploit could allow the attacker to create Administrator accounts. With these accounts, the attacker could access and modify telephony and user resources across all the Unified platforms that are associated to the vulnerable Cisco Unified CCMP. To successfully exploit this vulnerability, an attacker would need valid Advanced User credentials.

Weakness

The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.

Affected Software

Name Vendor Start Version End Version
Unified_contact_center_express Cisco 12.0.1 (including) 12.0.1 (including)
Unified_contact_center_express Cisco 12.5.1 (including) 12.5.1 (including)
Unified_contact_center_management_portal Cisco * 11.6.1 (including)

Potential Mitigations

  • For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
  • Even though client-side checks provide minimal benefits with respect to server-side security, they are still useful. First, they can support intrusion detection. If the server receives input that should have been rejected by the client, then it may be an indication of an attack. Second, client-side error-checking can provide helpful feedback to the user about the expectations for valid input. Third, there may be a reduction in server-side processing time for accidental input errors, although this is typically a small savings.

References