Home Cisco CVE-2024-20255
Back to Cisco

CVE-2024-20255

Cisco Expressway Series - SOAP API

Cisco CVSS 8.2 Updated March 16, 2026

Executive Risk Summary

"A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system."

Operational Audit Arsenal

Target Type Web Application
Target Asset SOAP API
Standard Path Management Plane

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential service interruption during patch application

Internal Work Notes

CVE-2024-20255: Unauthenticated CSRF vulnerability in Cisco Expressway Series and Cisco TelePresence Video Communication Server SOAP API, requiring patch update to prevent potential system reload attacks.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.