6.4
CVSSv2

CVE-2020-3482

Published: 18/11/2020 Updated: 02/12/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 6.5 | Impact Score: 2.5 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

A vulnerability in the Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software could allow an unauthenticated, remote malicious user to bypass security controls and send network traffic to restricted destinations. The vulnerability is due to improper validation of specific connection information by the TURN server within the affected software. An attacker could exploit this issue by sending specially crafted network traffic to the affected software. A successful exploit could allow the malicious user to send traffic through the affected software to destinations beyond the application, possibly allowing the malicious user to gain unauthorized network access.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco expressway

cisco telepresence video communication server

Vendor Advisories

The Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software supports the relay of media connections through a firewall using proxy services As a result of this feature, interfaces such as the Cisco Expressway web administrative interface may become accessible from external networks At the time of publication, docume ...