Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Cisco urges users to update this dangerous software flaw immediately, or put devices at risk of being hacked

A computer being guarded by cybersecurity.

Cisco has urged customers to apply its latest security patch to protect their endpoints from a vulnerability tracked as CVE-2024-20272, found in its Unity Connection platform.

This vulnerability allows threat actors to gain root privileges on unpatched endpoints remotely which, in turn, grants them the ability to install malware on the devices. 

Unity Connection is a virtualized messaging and voicemail platform that works with email inboxes, web browsers, smartphones, tablets, and other Cisco solutions.

Fixing a dozen flaws

"This vulnerability is due to a lack of authentication in a specific API and improper validation of user-supplied data,” Cisco explained in a security advisory. “An attacker could exploit this vulnerability by uploading arbitrary files to an affected system." 

"A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root."

While the vulnerability sounds dangerous, good news is that no threat actors seem to have discovered it so far. Cisco’s Product Security Incident Response Team (PSIRT) says there is no evidence the flaw was abused in the wild.

The patch for CVE-2024-20727 comes as part of a wider patching effort, BleepingComputer reported. In total, 10 medium-severity vulnerabilities were addressed, spanning multiple programs. These vulnerabilities could be used to escalate privileges, launch cross-site scripting attacks (XSS), inject commands, and similar.

For one of the vulnerabilities, a proof-of-concept exploit code is already available. 

Lately, Cisco’s been hard at work uncovering and patching zero-day vulnerabilities. In late October last year, the company released a patch to fix two high-severity flaws that were being abused in the wild to take over vulnerable endpoints. One vulnerability was found in the Web User Interface of Cisco IOS XE software connected to the public internet. So, whatever Cisco endpoint (routers, switches, etc.) that runs the software, has HTTP and HTTPS Server features enabled, and is connected to the internet, was vulnerable to full device takeover.

More from TechRadar Pro

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.