{"vulnerability": "CVE-2024-20497", "sightings": [{"uuid": "39d7a19b-30ca-4c8a-b6d1-eea6ca16c913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20497", "type": "seen", "source": "https://t.me/cvedetector/4822", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20497 - \"Cisco Expressway Edge Unauthorized Remote User Access and Call Interception Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-20497 \nPublished : Sept. 4, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability in Cisco Expressway Edge (Expressway-E) could allow an authenticated, remote attacker to masquerade as another user on an affected system.  \n  \nThis vulnerability is due to inadequate authorization checks for Mobile and Remote Access (MRA) users. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to intercept calls that are destined for a particular phone number or to make phone calls and have that phone number appear on the caller ID. To successfully exploit this vulnerability, the attacker must be an MRA user on an affected system. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T20:15:48.000000Z"}]}