First published: Wed Nov 20 2019(Updated: )
A vulnerability in web interface of the Cisco Webex Event Center, Cisco Webex Meeting Center, Cisco Webex Support Center, and Cisco Webex Training Center could allow an unauthenticated, remote attacker to guess account usernames. The vulnerability is due to missing CAPTCHA protection in certain URLs. An attacker could exploit this vulnerability by sending a crafted request to the web interface. A successful exploit could allow the attacker to know if a given username is valid and find the real name of the user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-webex-centers-infodis
Credit: Yakov Shafranovich TPankaj Upadhyay T
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Events Center | ||
Cisco WebEx Meeting Center | ||
Cisco Webex Support Center | ||
Cisco WebEx Training Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191120-webex-centers-infodis is critical as it allows unauthenticated attackers to guess account usernames.
To fix cisco-sa-20191120-webex-centers-infodis, implement CAPTCHA protection in the web interface of the affected Webex products.
The affected products include Cisco Webex Event Center, Cisco Webex Meeting Center, Cisco Webex Support Center, and Cisco Webex Training Center.
This vulnerability can be exploited by unauthenticated, remote attackers.
If not addressed, attackers could potentially access user account usernames, leading to increased risk of account compromise.