First published: Wed Sep 02 2020(Updated: )
A vulnerability in Cisco Webex Training could allow an authenticated, remote attacker to join a password-protected meeting without providing the meeting password. The vulnerability is due to improper validation of input to API requests that are a part of meeting join flow. An attacker could exploit this vulnerability by sending an API request to the application, which would return a URL that includes a meeting join page that is prepopulated with the meeting username and password. A successful exploit could allow the attacker to join the password-protected meeting. The attacker would be visible in the attendee list of the meeting. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-meetings-UtbwOR4Q
Credit: Eric Merrill Oakland University
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Training Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-webex-meetings-UtbwOR4Q is rated as critical because it allows unauthorized access to password-protected Webex Training meetings.
To fix the cisco-sa-webex-meetings-UtbwOR4Q vulnerability, ensure that you update your Cisco Webex Training software to the latest version provided by Cisco.
Cisco Webex Training users who rely on password protection for their meetings are at risk from the cisco-sa-webex-meetings-UtbwOR4Q vulnerability.
The cisco-sa-webex-meetings-UtbwOR4Q vulnerability enables an authenticated attacker to bypass meeting passwords and join meetings without permission.
The cisco-sa-webex-meetings-UtbwOR4Q vulnerability was publicly disclosed in a Cisco security advisory.