First published: Wed Jun 02 2021(Updated: )
A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ
Credit: Kushal Arvind Shah Fortinet
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Network Recording Player | ||
Cisco WebEx Recording Format Player |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-player-dOJ2jOJ is considered high due to the potential for attackers to execute arbitrary code.
To fix cisco-sa-webex-player-dOJ2jOJ, update the Cisco Webex Network Recording Player and Cisco Webex Player to the latest versions provided by Cisco.
The affected systems include Cisco Webex Network Recording Player and Cisco Webex Player for both Windows and MacOS.
cisco-sa-webex-player-dOJ2jOJ can allow attackers to execute arbitrary code, potentially leading to unauthorized access and data compromise.
Currently, there are no specified workarounds for cisco-sa-webex-player-dOJ2jOJ; applying the update is the recommended mitigation.