First published: Wed Nov 18 2020(Updated: )
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit requires the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. The attacker could then exploit this vulnerability to join meetings, without appearing in the participant list, while having full access to audio, video, chat, and screen sharing capabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-auth-token-3vg57A5r
Credit: the following researchers IBM Research
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client | ||
Cisco Webex Meetings Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-webex-auth-token-3vg57A5r is classified as high severity due to the potential for unauthorized access to Webex sessions.
To fix cisco-sa-webex-auth-token-3vg57A5r, ensure that you apply the latest patches and updates provided by Cisco for your Webex software.
The vulnerability cisco-sa-webex-auth-token-3vg57A5r allows unauthenticated attackers to join Webex sessions without being visible on the participant list.
Users of Cisco Webex Meetings and Cisco Webex Meetings Server are affected by the vulnerability cisco-sa-webex-auth-token-3vg57A5r.
Consequences of the cisco-sa-webex-auth-token-3vg57A5r vulnerability include potential unauthorized access to sensitive meetings and data.