First published: Mon Apr 13 2020(Updated: )
Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. The vulnerability is due to improper validation of host header values. An attacker with a privileged network position, either a man-in-the-middle or by intercepting wireless network traffic, could exploit this vulnerability to manipulate header values sent by a client to the affected application. The attacker could cause the application to use input from the header to redirect a user from the Cisco Webex Meetings Online site to an arbitrary site of the attacker's choosing.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Business Suite | <39.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1866 is classified as a high severity vulnerability due to its potential impact on application integrity.
CVE-2019-1866 allows an unauthenticated remote attacker to affect the integrity of the Cisco Webex Business Suite.
To mitigate CVE-2019-1866, it is recommended to upgrade Cisco Webex Business Suite to version 39.1.0 or later.
Organizations using Cisco Webex Business Suite versions prior to 39.1.0 are vulnerable to CVE-2019-1866.
CVE-2019-1866 is caused by improper validation of host header values within the Cisco Webex Business Suite.