8.8
CVE-2026-20098
- EPSS -
- Veröffentlicht 04.02.2026 16:11:48
- Zuletzt bearbeitet 04.02.2026 17:16:14
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system. This vulnerability is due to improper input validation in certain sections of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload arbitrary files to the affected system. The malicious files could overwrite system files that are processed by the root system account and allow arbitrary command execution with root privileges. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of video operator.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco Meeting Management
Default Statusunknown
Version
CMM3.4.0
Status
affected
Version
CMM3.2.0
Status
affected
Version
CMM2.9.1
Status
affected
Version
CMM2.9.0
Status
affected
Version
CMM3.1.0
Status
affected
Version
CMM3.5.0
Status
affected
Version
CMM3.6.0
Status
affected
Version
CMM3.6.1
Status
affected
Version
CMM3.7.0
Status
affected
Version
CMM3.8.0
Status
affected
Version
CMM3.9.0
Status
affected
Version
CMM3.10.0
Status
affected
Version
CMM3.9.1
Status
affected
Version
CMM3.11.0
Status
affected
Version
CMM3.12.0
Status
affected
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.