Home Cisco CVE-2023-20105
Back to Cisco

CVE-2023-20105

Cisco Expressway Series - Web-based Management Interface

Cisco CVSS 9.6 Updated March 18, 2026

Executive Risk Summary

"A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system. This vulnerability is due to incorrect handling of password change requests, allowing an attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset Cisco Expressway Series Firmware
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

CVE-2023-20105: Privilege Escalation Vulnerability in Cisco Expressway Series, requires immediate attention to patch and prevent potential administrative access compromise.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.