First published: Wed Aug 26 2020(Updated: )
A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to improper validation of URL parameters that are sent from a website to the affected application. An attacker could exploit this vulnerability by persuading a user to follow a URL to a website that is designed to submit crafted input to the affected application. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system, possibly corrupting or deleting critical system files.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings | <40.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3440 is a vulnerability in Cisco Webex Meetings Desktop App for Windows that allows an unauthenticated remote attacker to overwrite arbitrary files on an end-user system.
CVE-2020-3440 affects Cisco Webex Meetings Desktop App for Windows by allowing an unauthenticated remote attacker to overwrite arbitrary files on an end-user system.
The severity of CVE-2020-3440 is medium with a CVSS score of 6.5.
An attacker can exploit CVE-2020-3440 by sending malicious URL parameters from a website to the affected application.
Yes, Cisco has released a security advisory with mitigation measures for CVE-2020-3440. It is recommended to apply the necessary updates to address this vulnerability.