First published: Thu Nov 04 2021(Updated: )
A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40128 is a vulnerability in the account activation feature of Cisco Webex Meetings that allows an unauthenticated attacker to send an activation email with an arbitrary domain.
CVE-2021-40128 has a severity rating of 5.3 which is considered medium.
CVE-2021-40128 allows an unauthenticated attacker to send account activation emails with malicious activation links, potentially leading to unauthorized account access.
Yes, Cisco has released a security advisory with mitigation measures for CVE-2021-40128. It is recommended to apply the provided patches or updates.
You can find more information about CVE-2021-40128 in the Cisco Security Advisory: [link](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-activation-3sdNFxcy).