ID

VAR-202602-1336


CVE

CVE-2026-20098


TITLE

Cisco Systems Cisco Meeting Management Vulnerability in unlimited upload of dangerous types of files in

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799

DESCRIPTION

A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system. This vulnerability is due to improper input validation in certain sections of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload arbitrary files to the affected system. The malicious files could overwrite system files that are processed by the root system account and allow arbitrary command execution with root privileges. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of video operator. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-20098 // JVNDB: JVNDB-2026-006799

AFFECTED PRODUCTS

vendor:ciscomodel:meeting managementscope:ltversion:3.12.1

Trust: 1.0

vendor:シスコシステムズmodel:cisco meeting managementscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco meeting managementscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco meeting managementscope:eqversion:3.12.1

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799 // NVD: CVE-2026-20098

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@cisco.com: CVE-2026-20098
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-006799
value: HIGH

Trust: 0.8

psirt@cisco.com: CVE-2026-20098
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-006799
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799 // NVD: CVE-2026-20098

PROBLEMTYPE DATA

problemtype:CWE-434

Trust: 1.0

problemtype:Unlimited uploads of dangerous types of files (CWE-434) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799 // NVD: CVE-2026-20098

PATCH

title:Cisco Meeting Management Arbitrary File Upload Vulnerabilityurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-file-up-kY47n8kK

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799

EXTERNAL IDS

db:NVDid:CVE-2026-20098

Trust: 2.6

db:JVNDBid:JVNDB-2026-006799

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799 // NVD: CVE-2026-20098

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-cmm-file-up-ky47n8kk

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-20098

Trust: 0.8

sources: JVNDB: JVNDB-2026-006799 // NVD: CVE-2026-20098

SOURCES

db:JVNDBid:JVNDB-2026-006799
db:NVDid:CVE-2026-20098

LAST UPDATE DATE

2026-03-13T23:27:04.389000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-006799date:2026-03-12T03:10:00
db:NVDid:CVE-2026-20098date:2026-03-10T20:14:59.117

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-006799date:2026-03-12T00:00:00
db:NVDid:CVE-2026-20098date:2026-02-04T17:16:14.107