First published: Wed Jun 03 2020(Updated: )
A vulnerability in Cisco Webex Network Recording Player and Cisco Webex Player for Microsoft Windows could allow an attacker to cause a process crash resulting in a Denial of service (DoS) condition for the player application on an affected system. The vulnerability exists due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to cause the Webex player application to crash when trying to view the malicious file.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Network Recording Player | ||
Cisco Webex Player |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Webex vulnerability is CVE-2020-3322.
The title of this vulnerability is 'A vulnerability in Cisco Webex Network Recording Player and Cisco Webex Player for Microsoft Windows...'
The severity of CVE-2020-3322 is medium.
This vulnerability can be exploited by causing a process crash in Cisco Webex Network Recording Player and Cisco Webex Player for Microsoft Windows, resulting in a denial of service condition.
To fix this vulnerability, it is recommended to update the affected Cisco Webex Network Recording Player and Cisco Webex Player for Microsoft Windows to the latest version.