First published: Wed Aug 19 2020(Updated: )
A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to improper validation of URL parameters that are sent from a website to the affected application. An attacker could exploit this vulnerability by persuading a user to follow a URL to a website that is designed to submit crafted input to the affected application. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system, possibly corrupting or deleting critical system files. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-desktop-app-OVSfpVMj
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-desktop-app-OVSfpVMj is high due to the potential for file overwriting by an unauthenticated attacker.
To fix cisco-sa-webex-desktop-app-OVSfpVMj, ensure you update to the latest version of the Cisco Webex Meetings Desktop App.
cisco-sa-webex-desktop-app-OVSfpVMj impacts all versions of the Cisco Webex Meetings Desktop App for Windows.
cisco-sa-webex-desktop-app-OVSfpVMj allows remote attackers to overwrite arbitrary files on a user's system.
No, cisco-sa-webex-desktop-app-OVSfpVMj can be exploited by unauthenticated remote attackers.