First published: Wed Apr 07 2021(Updated: )
A vulnerability in certain web pages of Cisco Webex Meetings could allow an unauthenticated, remote attacker to modify a web page in the context of a user's browser. The vulnerability is due to improper checks on parameter values in affected pages. An attacker could exploit this vulnerability by persuading a user to follow a crafted link that is designed to pass HTML code into an affected parameter. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-VObwRKWV
Credit: Sem Voigtländer.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-VObwRKWV is classified by Cisco and could be considered high due to the potential for remote attack without authentication.
To mitigate cisco-sa-webex-VObwRKWV, users should update their Cisco Webex Meetings Client to the latest version provided by Cisco.
cisco-sa-webex-VObwRKWV can enable unauthenticated remote attackers to modify web content in a user's browser session.
cisco-sa-webex-VObwRKWV primarily affects the Cisco Webex Meetings Client.
Yes, cisco-sa-webex-VObwRKWV can be exploited remotely by attackers without the need for user authentication.