Cisco Unified Communications Products Arbitrary File Write (cisco-sa-cucm-arb-write-74QzruUU)

medium Nessus Plugin ID 160336


The remote device is missing a vendor-supplied security patch


According to its self-reported version number, the software upgrade process of Cisco Unified Communications Manager (Unified CM) and Cisco Unified CM Session Management Edition is affected by an arbitrary file write vulnerability. An authenticated remote attacker can exploit this vulnerability to write arbitrary files on the affected system with root-level privileges.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvy52032

See Also

Plugin Details

Severity: Medium

ID: 160336

File Name: cisco-sa-cucm-arb-write-74QzruUU.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 4/29/2022

Updated: 4/5/2024

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:C

CVSS Score Source: CVE-2022-20789


Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:unified_communications_manager

Required KB Items: Host/Cisco/CUCM/Version, Host/Cisco/CUCM/Version_Display

Exploit Ease: No known exploits are available

Patch Publication Date: 4/20/2022

Vulnerability Publication Date: 4/20/2022

Reference Information

CVE: CVE-2022-20789

CWE: 73

CISCO-SA: cisco-sa-cucm-arb-write-74QzruUU

IAVA: 2022-A-0178-S