A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.
This vulnerability is due to improper input validation in certain sections of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload arbitrary files to the affected system. The malicious files could overwrite system files that are processed by the root system account and allow arbitrary command execution with root privileges. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of video operator.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-file-up-kY47n8kK
Security Impact Rating: High
CVE: CVE-2026-20098
Mehrere Schwachstellen (CVE-2026-20056, CVE-2026-20098, CVE-2026-20111, CVE-2026-20119, CVE-2026-20123) in Cisco
Zusammenfassung
Eine kritische Schwachstelle in der Zertifikatsverwaltung von Cisco Meeting Management ermöglicht es einem authentifizierten Angreifer, beliebige Dateien hochzuladen und mit Root-Rechten auszuführen. Der Fehler liegt in der mangelhaften Eingabevalidierung der Web-Oberfläche. Cisco hat Updates veröffentlicht, um diese Sicherheitslücke zu schließen. Anwender sollten die Aktualisierungen zeitnah einspielen.
Quelle: sec.cloudapps.cisco.com