First published: Wed Jan 08 2020(Updated: )
A vulnerability in the way Cisco Webex applications process Universal Communications Format (UCF) files could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of UCF media files. An attacker could exploit this vulnerability by sending a user a malicious UCF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit would cause the application to quit unexpectedly. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-centers-dos
Credit: Wen Guang Jiao Qihoo 360 Core Security
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20200108-webex-centers-dos is classified as High due to its potential to cause a denial of service condition.
To fix cisco-sa-20200108-webex-centers-dos, update your Cisco Webex software to the latest version provided by Cisco.
The affected product for cisco-sa-20200108-webex-centers-dos is the Cisco Webex application.
cisco-sa-20200108-webex-centers-dos is a denial of service (DoS) vulnerability.
An attacker can exploit cisco-sa-20200108-webex-centers-dos by sending specially crafted Universal Communications Format (UCF) files to the Cisco Webex application.