First published: Wed Apr 06 2022(Updated: )
A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-java-MVX6crH9
Credit: Jeremy Heng Apple
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-java-MVX6crH9 is rated as high due to its potential to allow remote code execution through deserialization vulnerabilities.
To fix cisco-sa-webex-java-MVX6crH9, ensure that you update Cisco Webex Meetings to the latest version provided by Cisco.
Users of the Cisco Webex Meetings application are affected by the cisco-sa-webex-java-MVX6crH9 vulnerability.
The vulnerability in cisco-sa-webex-java-MVX6crH9 involves improper deserialization of Java code that can be exploited during login requests.
Yes, cisco-sa-webex-java-MVX6crH9 can be exploited by authenticated, remote attackers injecting arbitrary Java code.