First published: Sat Dec 14 2013(Updated: )
Cisco WebEx Training Center allows remote attackers to discover session numbers, and bypass host approval for audio-conference attendance, by reading HTML source code, aka Bug ID CSCul57126.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Training Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6972 has been classified with a moderate severity rating due to its potential to allow unauthorized access.
To mitigate CVE-2013-6972, ensure that you are using the latest version of Cisco WebEx Training Center with all security patches applied.
CVE-2013-6972 is an information disclosure vulnerability that allows attackers to extract session numbers.
CVE-2013-6972 affects users of Cisco WebEx Training Center that are not keeping their software updated.
The potential impact of CVE-2013-6972 includes unauthorized attendance in audio conferences without host approval.