First published: Mon Apr 13 2020(Updated: )
vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security warning dialog boxes when a room host views shared multimedia files. An authenticated, remote attacker could exploit this vulnerability by using the host role to share files within the Multimedia sharing feature and convincing a former room host to view that file. A warning dialog normally appears cautioning users before the file is displayed; however, the former host would not see that warning dialog, and any shared multimedia would be rendered within the user's browser. The attacker could leverage this behavior to conduct additional attacks by including malicious files within a targeted room host's browser window.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Meetings Server | =t39.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Webex Meetings vulnerability is CVE-2020-3126.
The severity of CVE-2020-3126 vulnerability is low, with a CVSS score of 3.5.
The vulnerability affects Cisco Webex Meetings Server version t39.3.
An authenticated, remote attacker can exploit this vulnerability to bypass security protections in the Multimedia Viewer feature of Cisco Webex Meetings.
Yes, Cisco has released a fix for this vulnerability. Please refer to the Cisco Security Advisory for more information.