First published: Tue Mar 04 2025(Updated: )
A low-severity vulnerability in Cisco Webex for BroadWorks Release 45.2 could allow an unauthenticated, remote attacker to access data and credentials if unsecure transport is configured for SIP communication.This vulnerability is due to the exposure of sensitive information in the SIP headers.A related issue could allow an authenticated user to access credentials in plain text in the client and server logs. A malicious actor could exploit this vulnerability and the related issue to access data and credentials and impersonate the user.A configuration change to fix this vulnerability and the related issue has been pushed to Cisco Webex for BroadWorks. Cisco recommends that customers restart their Cisco Webex application to apply the configuration changes.There is a workaround that addresses this vulnerability and the related issue.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex for BroadWorks |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-credexp-xMN85y6 is classified as low.
To fix cisco-sa-webex-credexp-xMN85y6, ensure secure transport is configured for SIP communication.
cisco-sa-webex-credexp-xMN85y6 is an information exposure vulnerability.
An attacker can access data and credentials if unsecure transport is configured.
Cisco Webex for BroadWorks is the affected product by cisco-sa-webex-credexp-xMN85y6.