First published: Wed Jun 02 2021(Updated: )
A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to cause the affected software to terminate or to gain access to memory state information that is related to the vulnerable application. The vulnerability is due to insufficient validation of values in Webex recording files that are stored in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a malicious WRF file to a user as a link or email attachment and then persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to crash the affected software and view memory state information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-kxtkFbnR
Credit: Kushal Arvind Shah Fortinet
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Recording Format Player |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-player-kxtkFbnR is high, as it can allow an attacker to cause significant disruption or access sensitive information.
To fix cisco-sa-webex-player-kxtkFbnR, update the Cisco Webex Player to the latest version provided by Cisco.
cisco-sa-webex-player-kxtkFbnR affects Cisco Webex Player on both Windows and MacOS platforms.
The potential consequences of cisco-sa-webex-player-kxtkFbnR include application termination and unauthorized access to memory state information.
Currently, there are no official workarounds for cisco-sa-webex-player-kxtkFbnR, and updating the software is recommended.