First published: Wed May 02 2018(Updated: )
A vulnerability in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. The vulnerability is due to a design flaw in the affected software. An attacker could exploit this vulnerability by sending a user an email attachment or link to a malicious ARF file and persuading the user to open the file or follow the link. A successful exploit could allow the attacker to execute arbitrary code on the user's system. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco WebEx ARF players. Cisco Bug IDs: CSCvh70213, CSCvh70222, CSCvh70228.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings | =t30 | |
Cisco Webex Meetings | =t32.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0287 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2018-0287, users should update to the latest version of Cisco WebEx Meetings that addresses this vulnerability.
CVE-2018-0287 affects users of Cisco WebEx Meetings, specifically versions t30 and t32.7.
CVE-2018-0287 can be exploited by an unauthenticated, remote attacker to execute arbitrary code on the affected system.
There are no documented workarounds for CVE-2018-0287; the best course of action is to apply the necessary software updates.