top of page
Modux Logo_edited.jpg

This week I had the pleasure of visiting my former university, Cardiff University, to spend a day with the Computer Science and Software Engineering students. It was great to be back on campus and talk through my personal career path, from completing my BSc to my current role as a Penetration Tester at Modux.


Mel presenting slides to Cardiff Uni students

I delivered a presentation that aimed to give some insights into my career path in cyber security and offer some practical guidance. This started with a quick introduction: I am a Cardiff University graduate in Computer Science and I went on to do an MSc in Cyber Security at the University of Edinburgh before joining Modux in 2024.


I started by explaining what penetration testing actually is and what my day-to-day work involves. Very simply put, we conduct authorised security testing to find weaknesses and report them back to clients, so they can be remediated before malicious actors can exploit them. Our work covers everything from infrastructure and web app testing to cloud and physical security reviews. Fun fact: Modux is the leading cyber security consultancy in the rail sector, which is why I’ve spent a surprising amount of time plugging my laptop into trains over the last year!


While we offer a wide range of services to many different clients, the overarching goal of our work is largely the same: identify vulnerabilities and misconfigurations, show how they are exploitable, and provide a clear report for remediation. My daily schedule is a mix of hands-on technical work, reporting and interacting with clients. The variety is one of the things I like most about my role, where there is usually something new on the calendar each week.


Mel talking to Cardiff Uni students about her day-to-day tasks

In the second part of my presentation, I talked about how to build useful skills while at university to prepare for a career in cyber. I emphasised that besides gaining a good technical foundation through university modules, it is worth building practical, hands-on cyber skills in safe environments (like Capture the Flag, Hack The Box and TryHackMe). I also encouraged the students to create and showcase their own labs, as in my experience, this is one of the best ways to gain a deeper technical understanding of security vulnerabilities.


I addressed the challenge of finding junior roles in a field where practical experience is often listed as a key requirement. This included sharing my own path to landing my first full-time role: I went from doing a summer internship and part-time work during my Bachelor’s, onto my Master’s, and then my current role. Reviewing this progression, I highlighted that employers often highly value a clear demonstration of passion for technology and the ability to learn.


The Q&A part of the session allowed students to dig into the practical aspects of applying for roles. I got several questions about what to include on your CV and the job search process itself. I talked about where to find job opportunities (I used LinkedIn, Indeed and contacted companies directly) and what they can expect from different interview stages during a typical application process.


I wrapped up the talk with a few key takeaways that I learned from my own path into cyber:


  • Never stop learning - Cyber security is a constantly evolving field, so be curious and ask questions.

  • Collaboration is essential - Success in this field is a team effort. You’ll spend a lot of time working with colleagues, clients, and managers. A big part of the job is communicating and working well with others.

  • Don’t forget about the soft skills - Technical ability and knowledge will only get you so far. The ability to talk to clients, communicate complex technical issues to diverse audiences, and understand the context and bigger picture of your findings are just as important.

 

All in all, it was a fun and rewarding day, and I hope I’ve inspired these students to get into cyber security and given them the actionable advice to get started.


We are thrilled to say that we won the SME Consultancy of the Year Award at The National Cyber Awards last night!


This recognition is a testament to the great work and dedication of the entire Modux team, as well as the continued trust of our clients.


Two of our consultants attended the awards evening on behalf of the company and had the honour of collecting the award. It was a fantastic moment for them, and for all of us, to see our work acknowledged among so many well-respected organisations.


The Awards Ceremony was hosted by Gordon Corera, Security Correspondent at the BBC and podcast host. The evening started with inspiring opening addresses from Andrea Thompson, Group Managing Director of BAE Systems Digital Intelligence, followed by Andrew Elliot, Director of Cyber Security at the Department for Science, Innovation and

Technology. They emphasised how cybersecurity leaders, along with many others working behind the scenes, play a crucial role in keeping our digital world safe.


Modux consultants collect the award
Modux consultants collect the SME Consultancy of the Year Award 2025

We’re honoured by this recognition and motivated to keep pushing forward by exploring new ideas and continuing to deliver exceptional results for our clients.


A heartfelt thank you to The National Cyber Awards for this recognition. We look forward to building on this success and reaching many more milestones in the future.




Modux is proud to share that our team recently discovered a critical vulnerability in Cisco’s Meeting Management (CMM) platform.


Our team uncovered a significant vulnerability in Cisco’s Meeting Management platform (CVE-2025-20156) that posed a serious risk to businesses relying on its web application for secure communication. This flaw, identified by Lead Security Consultant, Ben, allows for privilege escalation via the REST API - a serious discovery that could have far-reaching consequences for those affected.


How the Vulnerability Works


The vulnerability we discovered allows a malicious actor to bypass essential user controls within the Cisco Meeting Management system.


As a low-level non-administrative video operator user, it is possible to directly execute commands via the emulated SSH session present at the ‘/#servers/servers’ resource.

 

As expected, when accessed via the browser, non-administrator users are presented with an error page indicating they are lacking the privileges required to configure and connect to connected devices:

 

Screen shot
FIGURE 1 – EXPECTED MISSING PERMISSIONS ERROR

The application, however, fails to apply these restrictions at the API level, allowing a malicious user to directly connect to the ‘/api/ssh_run_command/’ endpoint and interact with any connected devices as if they were an administrator:


Screen shot of code
FIGURE 2 - 'WHOAMI' COMMAND SENT TO CONNECTED DEVICE

Screen shot of code
FIGURE 3 - DEVICE RESPONSE SHOWING ADMINISTRATOR USERNAME

The entered commands are executed under the context of whatever device administrator was used to connect and control the device with CMM – and therefore allows full administrative control over the device in question:


Screen shot of code
FIGURE 4 - DEVICE REQUEST TO LIST LOCAL USERS

Screen shot of code
FIGURE 5 - RESPONSE SHOWING FULL USER LIST

Shown below is the request and response to the ‘/api/user/me/’ API endpoint with the same user (note the identical session token) – which returns a response showing the only assigned role is operator:


Screen shot of code
FIGURE 6 - REQUEST TO CALLING USER PERMISSIONS LISTING API ENDPOINT

Screen shot of code
FIGURE 7 - RESPONSE SHOWING CALLING USER IS NOT AN ADMIN

Once this is achieved, the attacker gains the ability to execute privileged commands on any edge nodes connected to the platform, granting them administrative access. This privilege escalation opens the door to a range of malicious activities, including (but not limited to):

·         Complete administrative control over connected server devices.

·         The ability to intercept or modify live calls and meetings.

·         The potential to run malicious content on devices within the network.

·         Lateral movement within the network, potentially enabling attackers to spread their reach and compromise additional systems.

 

Cisco’s Response


Upon discovering this vulnerability, we immediately reported it to Cisco, who acted swiftly to address the issue. Cisco has since released software updates designed to mitigate the risk and close the security gap. These updates are crucial for businesses using CMM to ensure their systems remain secure and protected from potential exploitation.


Why It Matters


It’s easy to think that a product from a high profile vendor is fool proof, but our findings clearly demonstrate that vulnerabilities can exist even in solutions that are perceived to be thoroughly tested and secure.


The vulnerability we identified was technically straightforward to exploit, highlighting a crucial reality of modern cybersecurity - even well-known products, no matter how trusted, can have weaknesses that are easily overlooked.


Cisco’s prompt response to this issue is a testament to the company's commitment to safeguarding their users, but businesses must remain proactive in managing their security.


At Modux, we are committed to identifying and addressing vulnerabilities like these before they can be exploited. We help ensure our clients’ digital environments remain safe and resilient against emerging threats. For those using Cisco’s Meeting Management system, we strongly recommend applying the latest software updates to mitigate the risk posed by this vulnerability.


© 2025 Modux Limited | Registered in England & Wales (07084398)

bottom of page