CyberWatch

Vulnerability Report: Cisco’s Critical Vulnerability and Compliance Conundrum

By

By

Access Point Consulting

Summary

A Cisco Security Advisory was released on October 4th, 2023, regarding CVE-2023-20101. This vulnerability has a CVSS 3.1 base score of 9.8, marking it as critical. It affects the ‘Cisco Emergency Responder Release 12.5(1)SU4’ within their Unified Communications Manager. This vulnerability enables an unauthenticated remote attacker to log in to an affected device with root-level privileges.

Impact Assessment

CVE-2023-20101 is characterized by a low attack complexity, requiring no user interaction for exploitation and providing unauthorized access to root permissions on the device. These characteristics pose a significant security risk, as they enable attackers to remotely manipulate the device as they see fit.

What It Means for You

Exploiting this vulnerability can have severe consequences, including the compromise of your device and the potential for disabling the availability of critical services. If this vulnerability is successfully exploited, the attacker gains root privileges on the device, jeopardizing all associated data and accounts, with the risk of data exfiltration. Additionally, the use of a life-saving feature, Cisco Emergency Responder, may become compromised. This software plays a vital role in identifying the precise location of 9-1-1 callers through the 9-1-1 functionality in Cisco Unified Communications Manager. It ensures that when this feature is activated, emergency services receive the caller's exact location and can track it automatically. This compliance with legal and regulatory obligations reduces the liability risk associated with emergency calls."

Remediation

According to the Cisco Security Advisory there are no workarounds, but you can update to version 12.5(1)SU5 of this software to remediate the vulnerability.

Business Implications

Having a vulnerable version of this software in your device inventory can lead to serious consequences, not only if the vulnerability is exploited but also because its presence may jeopardize your legal and regulatory obligations. This vulnerability impacts a critical life-saving feature designed to reduce liability associated with emergency calls. If a user's device with this vulnerability is exploited, and they attempt to make a 9-1-1 call through Cisco Unified Communications Manager, an unsuccessful call could potentially lead to liability for your organization due to non-patching. This risk is heightened by Kari’s Law and Ray Baum’s Act, which mandate direct 911 dialing, routing calls to the nearest 911 Public Safety Answering Point and notifying a secondary party during emergency calls. If your organization relies on this service to comply with these laws, it may be at risk due to this vulnerability.

Access Point Technology Recommends

To stay compliant with current statutes and ensure device security, Access Point Technology recommends you take the following actions:

  1. Application of the emergency patch is recommended due to the software affected and the severity of the vulnerability.
  2. Ensure compliance with Kari’s Law and RAY BAUMS act regarding Multi-line Telephone Systems.

Associated Bulletins

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cer-priv-esc-B9t3hqk9

https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-20101

https://www.cisco.com/c/en/us/products/unified-communications/unified-communications-manager-callmanager/index.html

https://www.fcc.gov/mlts-911-requirements

Resources

Latest Resources

Resources

CyberWatch

April 2, 2025

Scott "Monty" Montgomery (Island) | Navigating CMMC compliance for organizations of every size

Scott Montgomery, known as Monty, joined the CyberWatch Expert Series podcast to discuss his extensive background in cybersecurity, particularly in building and designing network security tools for high-assurance environments like the Department of Defense (DoD) and the intelligence community. His experience includes significant tenure at McAfee (now Trellix), which led him to his current role at Island, where he focuses on innovative approaches to cybersecurity compliance.

Find out more
March 19, 2025

Michael Sviben (DomainGuard) | Defending against phishing and building proactive security awareness

Cybersecurity threats evolve rapidly, and one tactic consistently rises above the rest: phishing. In this episode of CyberWatch, Michael Sviben, co-founder of DomainGuard, discusses why phishing remains so effective, how businesses and individuals become targets, and what you can do to stay vigilant.

Find out more
March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more