Vulnerability Details : CVE-2020-26068
A vulnerability in the xAPI service of Cisco Telepresence CE Software and Cisco RoomOS Software could allow an authenticated, remote attacker to generate an access token for an affected device. The vulnerability is due to insufficient access authorization. An attacker could exploit this vulnerability by using the xAPI service to generate a specific token. A successful exploit could allow the attacker to use the generated token to enable experimental features on the device that should not be available to users.
Products affected by CVE-2020-26068
- Cisco » Telepresence Collaboration EndpointVersions from including (>=) 9.10.0 and before (<) 9.10.3cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*
- Cisco » Telepresence Collaboration EndpointVersions from including (>=) 9.12.0 and before (<) 9.12.4cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:roomos:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-26068
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26068
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:N |
8.0
|
4.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
Cisco Systems, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
1.2
|
5.2
|
NIST |
CWE ids for CVE-2020-26068
-
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2020-26068
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-uathracc-jWNESUfM
Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation VulnerabilityVendor Advisory
Jump to