First published: Wed Nov 07 2018(Updated: )
A vulnerability in Cisco Meeting Server could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper protections on data that is returned from user meeting requests when the Guest access via ID and passcode option is set to Legacy mode. An attacker could exploit this vulnerability by sending meeting requests to an affected system. A successful exploit could allow the attacker to determine the values of meeting room unique identifiers, possibly allowing the attacker to conduct further exploits. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-meeting-server
Credit: Andrea Marini NTT DATA ItaliaFrancesco Russo NTT DATA Italia
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20181107-meeting-server is classified as high due to potential unauthorized access to sensitive information.
To mitigate the cisco-sa-20181107-meeting-server vulnerability, it is recommended to apply the latest security updates provided by Cisco for Cisco Meeting Server.
The cisco-sa-20181107-meeting-server vulnerability is caused by improper protections on data returned from user meeting requests.
The cisco-sa-20181107-meeting-server vulnerability affects users of Cisco Meeting Server with guest access enabled through ID and passcode.
Yes, the cisco-sa-20181107-meeting-server vulnerability is remotely exploitable by unauthenticated attackers.