First published: Wed Mar 04 2020(Updated: )
A vulnerability in the SSL implementation of the Cisco Intelligent Proximity solution could allow an unauthenticated, remote attacker to view or alter information shared on Cisco Webex video devices and Cisco collaboration endpoints if the products meet the conditions described in the Vulnerable Products section. The vulnerability is due to a lack of validation of the SSL server certificate received when establishing a connection to a Cisco Webex video device or a Cisco collaboration endpoint. An attacker could exploit this vulnerability by using man in the middle (MITM) techniques to intercept the traffic between the affected client and an endpoint, and then using a forged certificate to impersonate the endpoint. Depending on the configuration of the endpoint, an exploit could allow the attacker to view presentation content shared on it, modify any content being presented by the victim, or have access to call controls. This vulnerability does not affect cloud registered collaboration endpoints. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-proximity-ssl-cert-gBBu3RB
Credit: Adam Shore.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Proximity | ||
Cisco Webex Platform | ||
Cisco Collaboration Endpoints |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-proximity-ssl-cert-gBBu3RB is classified as high due to the potential for unauthorized access to sensitive information.
To fix cisco-sa-proximity-ssl-cert-gBBu3RB, you should apply the latest patches and updates provided by Cisco for the affected products.
The affected products include Cisco Intelligent Proximity, Cisco Webex, and Cisco Collaboration Endpoints.
An unauthenticated, remote attacker may exploit the vulnerability to view or alter information shared on the affected Cisco devices.
Currently, there are no known workarounds to mitigate the cisco-sa-proximity-ssl-cert-gBBu3RB vulnerability, and upgrading is recommended.