On September 6th, 2023, Cisco disclosed an authentication bypass vulnerability in its Cisco BroadWorks products. This vulnerability tracked as CVE-2023-20238, has a CVSS score of 10.0 (Critical). It allows an unauthenticated, remote attacker to forge credentials and gain unauthorized access to affected Cisco BroadWorks systems. This could enable the attacker to commit serious issues like toll fraud, view confidential data, modify customer settings, and more. Users of affected Cisco BroadWorks Platforms should urgently fix this vulnerability by upgrading to a patched release. We published this blog post to let our readers know about this vulnerability. In this blog post, we will cover the details of CVE-2023-20238, affected products, and finally, how to fix CVE-2023-20238, an Authentication Bypass Vulnerability in Cisco BroadWorks.
Cisco BroadWorks is a cloud-based unified communications platform that enables service providers to deliver voice, video, messaging, and collaboration services. The main components include:
BroadWorks Application Delivery Platform – The core call control and application server platform.
BroadWorks Xtended Services Platform – Provides value-added services like call center, receptionist, and custom applications.
BroadWorks allows easy integration with Web and mobile apps to provide a complete UCaaS solution. It is used by many telecom providers globally to deliver hosted VoIP and UC services.
CVE ID: CVE-2023-20238
CVSS Score:10.0 CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVE-2023-20238 is a critical authentication bypass vulnerability affecting the single sign-on (SSO) implementation in the Cisco BroadWorks Application Delivery Platform and Xtended Services Platform. This flaw, with a severity score of 10.0, is caused by improper validation of SSO tokens.
By exploiting this vulnerability, an unauthenticated, remote attacker could forge credentials to bypass authentication and gain unauthorized access to the BroadWorks system. The attacker only needs a valid user ID on the target system to successfully exploit this flaw.
Once logged in with forged credentials, the attacker could perform unauthorized actions and access data at the privilege level of the compromised account. This enables the attacker to commit toll fraud, access and modify customer information, change the settings of other users, and even gain admin privileges by compromising an admin account.
Successful exploitation of CVE-2023-20238 results in complete compromise and remote code execution on the vulnerable BroadWorks platform. Overall, this critical authentication bypass issue allows an external attacker to fully take over the affected system without needing any credentials.
According to Cisco’s advisory, the following Cisco BroadWorks platforms are affected if running a vulnerable software release:
Cisco BroadWorks Application Delivery Platform
Cisco BroadWorks Xtended Services Platform
The vulnerability affects BroadWorks releases 22.0 and earlier. Additionally, the flaw impacts the following applications if enabled on a vulnerable BroadWorks system:
AuthenticationService
BWCallCenter
BWReceptionist
CustomMediaFilesRetrieval
ModeratorClientApp
PublicECLQuery
PublicReporting
UCAPI
Xsi-Actions
Xsi-Events
Xsi-MMTel
Xsi-VTR
Cisco has released software updates to address this vulnerability in affected BroadWorks platforms.
To fix CVE-2023-20238, users should upgrade to the following patched releases:
For BroadWorks Application Delivery Platform and Xtended Services Platform version 22.0 and earlier, migrate to release 23.0 or later.
For Release Independent versions, upgrade to 2023.06_1.333 or 2023.07_1.332.
Cisco recommends upgrading to the latest available release as the only remediation measure. Administrators are advised to install the patched releases immediately to mitigate this critical remote code execution risk. There are no workarounds available.
Upgrade planning should account for sufficient system memory, hardware compatibility, and licensing requirements. Customers can obtain the fixed releases through regular update channels if they have an active service contract. Others can contact the Cisco TAC with the advisory URL and product serial number. A proactive upgrade to the latest BroadWorks releases is highly recommended to ensure protection against attacks exploiting this vulnerability. Staying up-to-date with security fixes for critical flaws is crucial for secure operations.
We hope this post helps you know how to fix CVE-2023-20238, an Authentication Bypass Vulnerability in Cisco BroadWorks. Thanks for reading this post. Please share this post and help secure the digital world. Visit our website thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
How To Fix CVE-2022-20798- An Authentication Bypass Vulnerability In Cisco ESA And Cisco SMA
How To Fix CVE-2022-20857- An Arbitrary Command Execution Vulnerability In Cisco Nexus Dashboard
How To Fix The SSH Key Vulnerability In Cisco Umbrella Virtual Appliance- CVE-2022-20773?
What Is Authentication Bypass Vulnerability? How To Prevent It?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.