First published: Fri Sep 04 2020(Updated: )
A vulnerability in Cisco Webex Training could allow an authenticated, remote attacker to join a password-protected meeting without providing the meeting password. The vulnerability is due to improper validation of input to API requests that are a part of meeting join flow. An attacker could exploit this vulnerability by sending an API request to the application, which would return a URL that includes a meeting join page that is prepopulated with the meeting username and password. A successful exploit could allow the attacker to join the password-protected meeting. The attacker would be visible in the attendee list of the meeting.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Training Center | <40.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3542 has been rated with a medium severity level.
To fix CVE-2020-3542, upgrade Cisco Webex Training to version 40.7.6 or later.
CVE-2020-3542 can be exploited by an authenticated, remote attacker who can join a password-protected meeting.
CVE-2020-3542 affects Cisco Webex Training versions prior to 40.7.6.
Yes, an attacker needs to be authenticated to exploit CVE-2020-3542.