First published: Fri Oct 05 2018(Updated: )
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Meetings Server | =3.0 | |
Cisco WebEx Meetings Server | =3.0-maintenance_release1 | |
Cisco WebEx Meetings Server | =3.0-maintenance_release2_patch1 | |
Cisco Webex Meetings Online | <1.3.38 | |
Cisco Webex Business Suite 32 | <32.15.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-15431 is high with a CVSS score of 7.3.
CVE-2018-15431 affects Cisco Webex Meetings Server version 3.0.
CVE-2018-15431 affects Cisco Webex Meetings Online up to version 1.3.38.
CVE-2018-15431 affects Cisco Webex Business Suite 32 up to version 32.15.30.
To mitigate the vulnerability described in CVE-2018-15431, it is recommended to apply the necessary security updates provided by Cisco.