First published: Wed Nov 18 2020(Updated: )
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to view sensitive information from the meeting room lobby. This vulnerability is due to insufficient protection of sensitive participant information. An attacker could exploit this vulnerability by browsing the Webex roster. A successful exploit could allow the attacker to gather information about other Webex participants, such as email address and IP address, while waiting in the lobby. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-infodisc-4tvQzn4
Credit: the following researchers IBM Research
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client | ||
Cisco Webex Meetings Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-webex-infodisc-4tvQzn4 vulnerability is classified as having a high severity due to its potential to expose sensitive information.
To address the cisco-sa-webex-infodisc-4tvQzn4 vulnerability, update your Cisco Webex Meetings and Webex Meetings Server to the latest patched version as recommended by Cisco.
The cisco-sa-webex-infodisc-4tvQzn4 vulnerability affects users of Cisco Webex Meetings and Cisco Webex Meetings Server.
The cisco-sa-webex-infodisc-4tvQzn4 vulnerability can allow an attacker to view sensitive participant information from the meeting room lobby.
No, the cisco-sa-webex-infodisc-4tvQzn4 vulnerability can be exploited by an unauthenticated remote attacker.