First published: Wed Aug 21 2019(Updated: )
A vulnerability in Cisco Webex Meetings Mobile (iOS) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data by using an invalid Secure Sockets Layer (SSL) certificate. The vulnerability is due to insufficient SSL certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted SSL certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings | >=11.3<=39.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1948 is a vulnerability in Cisco Webex Meetings Mobile (iOS) that allows an unauthenticated remote attacker to gain unauthorized read access to sensitive data.
CVE-2019-1948 works by leveraging an invalid Secure Sockets Layer (SSL) certificate to bypass SSL certificate validation.
CVE-2019-1948 has a severity rating of medium, with a severity value of 5.9.
To fix CVE-2019-1948, update Cisco Webex Meetings Mobile (iOS) to version 39.5 or later.
More information about CVE-2019-1948 can be found in the Cisco Security Advisory at: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-webex-ssl-cert