Impact
A vulnerability in the Certificate Management feature of Cisco Meeting Management permits authenticated remote attackers to upload arbitrary files. By sending a crafted HTTP request, an attacker can place files that overwrite system files processed by the root account, leading to arbitrary command execution and privilege escalation to root. This weakness stems from improper input validation, which corresponds to CWE‑434, and can compromise confidentiality, integrity, and availability of the system.
Affected Systems
Systems running Cisco Meeting Management are affected, specifically the Certificate Management component accessed via the web-based management interface. No specific affected versions are listed, so all deployed installations of Cisco Meeting Management should be reviewed for the presence of the vulnerability. The role required for exploitation is at least a video operator; therefore, accounts with this role or higher must be inspected.
Risk and Exploitability
The vulnerability carries a high CVSS score of 8.8, indicating severe impact. However, the EPSS score is less than 1% and the vulnerability has not been recorded in the CISA KEV catalog, suggesting exploitation probability remains low at present. If exploited, the attacker can upload files and execute root‑level commands, effectively gaining full control over the host. The exploitation path requires remote access to the web interface and valid credentials with video operator privileges, which may be obtained through credential compromise or insider misuse. Detection should focus on anomalous file uploads or unexpected command execution logs.
OpenCVE Enrichment