First published: Thu Jun 18 2020(Updated: )
A vulnerability in Cisco Webex Meetings Desktop App could allow an unauthenticated, remote attacker to execute programs on an affected end-user system. The vulnerability is due to improper validation of input that is supplied to application URLs. The attacker could exploit this vulnerability by persuading a user to follow a malicious URL. A successful exploit could allow the attacker to cause the application to execute other programs that are already present on the end-user system. If malicious files are planted on the system or on an accessible network file path, the attacker could execute arbitrary code on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings | <39.5.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3263 is a vulnerability in Cisco Webex Meetings Desktop App that could allow an unauthenticated remote attacker to execute programs on an affected end-user system.
CVE-2020-3263 has a severity rating of 7.5 (high).
CVE-2020-3263 occurs due to improper validation of input that is supplied to application URLs.
Cisco Webex Meetings Desktop App versions up to 39.5.12 are affected by CVE-2020-3263.
Yes, Cisco has released a security advisory with fixes for CVE-2020-3263. Please refer to the reference link for more information.