This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ARF files. Crafted data in an ARF file can trigger access to memory prior to initialization. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-269 is considered high due to its potential for remote code execution.
To fix ZDI-20-269, update the Cisco WebEx Network Recording Player to the latest version provided by Cisco.
ZDI-20-269 allows remote attackers to execute arbitrary code on affected installations via a malicious file or webpage.
Yes, user interaction is required as the target must visit a malicious page or open a malicious file to exploit ZDI-20-269.
ZDI-20-269 specifically affects installations of the Cisco WebEx Network Recording Player.