Cisco Fixes Critical Vulnerability in Meeting Management


Cisco has warned about a new privilege escalation vulnerability in its Meeting Management tool that could allow a remote attacker to gain administrator privileges on exposed instances.

The vulnerability, CVE-2025-20156, was disclosed by Cisco on January 22 and is awaiting further analysis by the US National Vulnerability Database (NVD).

Cisco also issued a security advisory the same day, allocating the flaw a severity score (CVSS) of 9.9, meaning it is a critical vulnerability.

Vulnerability in Cisco Meeting Management REST API

The vulnerability involves a combination of incorrect default permissions and improper handling of insufficient privileges in Cisco Meeting Management, said the NVD.

According to Cisco’s advisory, the vulnerability is due to a lack of proper authorization on the representational state transfer (REST) application programmable interface (API) of Cisco Meeting Management, a set of rules and guidelines for building and interacting with web services.

An attacker could exploit this vulnerability by sending API requests to a specific endpoint, which could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management.

The vulnerability affects all Cisco Meeting Management instances up to version 3.9. More recent instances (e.g. Cisco Meeting Management version 3.10) are not vulnerable.

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any current campaigns exploiting the vulnerability.

Cisco Released Fixed Version Update

Cisco has released a fixed software version, Cisco Meeting Management version 3.9.1.

The software manufacturer said no workarounds address this vulnerability and urged customers to update to this version.

“Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco Technical Assistance Center (TAC),” the provider added.

Cisco credited Modux’s Ben Leonard-Lagarde for initially reporting the vulnerability.



Source link