CVE-2020-3143

7.2 HIGH

📋 TL;DR

This directory traversal vulnerability in Cisco TelePresence video endpoint software allows authenticated attackers to read and write arbitrary files on affected devices. Attackers need either In-Room Control or administrator credentials to exploit it. The vulnerability affects Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS software.

💻 Affected Systems

Products:
  • Cisco TelePresence Collaboration Endpoint (CE) Software
  • Cisco TelePresence Codec (TC) Software
  • Cisco RoomOS Software
Versions: Multiple versions prior to specific fixes - see Cisco advisory for exact affected versions
Operating Systems: Cisco RoomOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with In-Room Control or administrator privileges

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to read sensitive configuration files, write malicious files, modify system settings, and potentially achieve remote code execution.

🟠

Likely Case

Unauthorized access to sensitive configuration files, credential theft, and modification of system settings leading to service disruption.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but the vulnerability itself is straightforward directory traversal

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions depending on product - see Cisco advisory

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telepresence-path-tr-wdrnYEZZ

Restart Required: Yes

Instructions:

1. Check Cisco advisory for exact affected versions. 2. Upgrade to fixed versions: CE Software 9.15.1 or later, TC Software 7.3.14 or later, RoomOS Software. 3. Apply patches through Cisco's standard update process. 4. Restart affected devices.

🔧 Temporary Workarounds

Restrict xAPI Access

all

Limit access to the xAPI interface to trusted networks and users only

Credential Management

all

Implement strong password policies and regularly rotate credentials for In-Room Control and administrator accounts

🧯 If You Can't Patch

  • Implement network segmentation to isolate TelePresence devices from critical systems
  • Monitor xAPI access logs for suspicious directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check device software version against affected versions listed in Cisco advisory

Check Version:

Check device web interface or use SSH to check version information

Verify Fix Applied:

Verify software version has been updated to fixed versions specified in Cisco advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual xAPI requests with directory traversal patterns (../ sequences)
  • Multiple failed authentication attempts followed by successful xAPI access
  • File access patterns outside normal operational directories

Network Indicators:

  • xAPI requests containing path traversal sequences
  • Unusual file transfer patterns from TelePresence devices

SIEM Query:

source="telepresence_logs" AND (message="*../*" OR message="*xAPI*" AND (message="*read*" OR message="*write*"))

🔗 References

📤 Share & Export