First published: Fri Jun 04 2021(Updated: )
A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to cause the affected software to terminate or to gain access to memory state information that is related to the vulnerable application. The vulnerability is due to insufficient validation of values in Webex recording files that are stored in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a malicious WRF file to a user as a link or email attachment and then persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to crash the affected software and view memory state information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Player | <41.5 | |
Cisco Webex Player | <41.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Webex Player vulnerability is CVE-2021-1527.
The severity of CVE-2021-1527 is medium with a severity value of 6.1.
This vulnerability affects Cisco Webex Player for Windows and MacOS.
An attacker can cause the affected software to terminate or gain access to memory state information related to the vulnerable application.
To fix CVE-2021-1527, update Cisco Webex Player to version 41.5 or later.