First published: Wed Mar 04 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ARF files. Crafted data in an ARF file can trigger access to memory prior to initialization. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex | ||
Cisco Webex Meetings | >=39.5<39.5.17 | |
Cisco Webex Meetings Online | <1.3.43 | |
Cisco WebEx Meetings Server | <3.0 | |
Cisco WebEx Meetings Server | =3.0 | |
Cisco WebEx Meetings Server | =3.0-maintenance_release1 | |
Cisco WebEx Meetings Server | =3.0-maintenance_release2 | |
Cisco WebEx Meetings Server | =3.0-maintenance_release3 | |
Cisco WebEx Meetings Server | =4.0 | |
Cisco WebEx Meetings Server | =4.0-maintenance_release1 | |
Cisco WebEx Meetings Server | =4.0-maintenance_release2 | |
Cisco Webex Network Recording Player | <39.5.17 | |
Cisco Webex Network Recording Player | <39.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-3127.
The severity of CVE-2020-3127 is critical, with a severity value of 7.8.
The following software is affected by CVE-2020-3127: Cisco Webex Network Recording Player for Microsoft Windows, Cisco Webex Player for Microsoft Windows, Cisco Webex Meetings, Cisco Webex Meetings Online, Cisco WebEx Meetings Server.
An attacker can exploit CVE-2020-3127 by executing arbitrary code on an affected system.
You can find more information about CVE-2020-3127 at the following references: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200304-webex-player) and [Zero Day Initiative](https://www.zerodayinitiative.com/advisories/ZDI-20-269/).