First published: Wed Jul 15 2020(Updated: )
A vulnerability in certain web pages of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to modify a web page in the context of a browser. The vulnerability is due to improper checks on parameter values within affected pages. An attacker could exploit this vulnerability by persuading a user to follow a crafted link that is designed to pass HTML code into an affected parameter. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious web sites, or the attacker could leverage this vulnerability to conduct further client-side attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-html-BJ4Y9tX
Credit: Gabriele Pippi Certego IRT
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client | ||
Cisco Webex Meetings Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-html-BJ4Y9tX is considered high due to potential unauthorized modifications of web pages.
To fix cisco-sa-webex-html-BJ4Y9tX, update your Cisco Webex Meetings and Webex Meetings Server to the latest version that includes security patches.
Users of Cisco Webex Meetings and Cisco Webex Meetings Server are affected by the cisco-sa-webex-html-BJ4Y9tX vulnerability.
cisco-sa-webex-html-BJ4Y9tX can be exploited by unauthenticated remote attackers to modify web page content in the context of a user’s browser.
cisco-sa-webex-html-BJ4Y9tX was disclosed on August 1, 2023.