First published: Wed Jan 13 2021(Updated: )
A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Teams | <40.12.0.17293 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1242 is medium with a severity value of 4.3.
CVE-2021-1242 allows an unauthenticated remote attacker to manipulate file names within the messaging interface of Cisco Webex Teams.
An attacker can exploit CVE-2021-1242 by sharing a file within the messaging interface that contains specially crafted character rendering.
Yes, Cisco has released a security advisory with mitigation details and software updates to address the vulnerability. Please refer to the Cisco Security Advisory for more information.