First published: Wed Nov 18 2020(Updated: )
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to maintain bidirectional audio despite being expelled from an active Webex session. The vulnerability is due to a synchronization issue between meeting and media services on a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit could allow the attacker to maintain the audio connection of a Webex session despite being expelled.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Server Software | <3.0 | |
Cisco Webex Meetings Server Software | =3.0-maintenance_release2 | |
Cisco Webex Meetings Server Software | =3.0-maintenance_release3 | |
Cisco Webex Meetings Server Software | =4.0 | |
Cisco Webex Meetings Server Software | =4.0-maintenance_release1 | |
Cisco Webex Meetings Server Software | =4.0-maintenance_release2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3471 has a medium severity rating, indicating a moderate risk of exploitation.
To fix CVE-2020-3471, it is recommended to update to the latest versions of Cisco Webex Meetings Server or apply relevant patches as provided by Cisco.
CVE-2020-3471 affects users of Cisco Webex Meetings and Cisco Webex Meetings Server versions up to 4.0.
An attacker exploiting CVE-2020-3471 can maintain bidirectional audio communication in a Webex session even after being expelled.
Currently, there are no specific workarounds provided for CVE-2020-3471 other than applying the recommended updates.