First published: Fri Jun 04 2021(Updated: )
A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Desktop | ||
Cisco Webex Meetings Online | ||
Cisco WebEx Meetings Server | =4.0 | |
Cisco Webex Network Recording Player | ||
Cisco Webex Teams | =3.0.15485.0 | |
Cisco Webex Network Recording Player | <41.5 | |
Cisco Webex Network Recording Player | <41.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1502.
The severity of CVE-2021-1502 is high (7.8).
Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS are affected by CVE-2021-1502.
An attacker can exploit CVE-2021-1502 by executing arbitrary code on an affected system.
Yes, a fix is available for CVE-2021-1502. Please refer to the official Cisco Security Advisory for more information.