First published: Wed Jun 02 2021(Updated: )
A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. This vulnerability is due to insufficient validation of values in Webex recording files that are in either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-rCFDeVj2
Credit: Kushal Arvind Shah Fortinet
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Network Recording Player | ||
Cisco WebEx Recording Format Player |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-webex-player-rCFDeVj2 vulnerability is critical due to the potential for arbitrary code execution.
To fix the cisco-sa-webex-player-rCFDeVj2 vulnerability, update to the latest version of the affected Cisco Webex Player software.
Users of Cisco Webex Network Recording Player and Cisco Webex Player on Windows and macOS are affected by cisco-sa-webex-player-rCFDeVj2.
cisco-sa-webex-player-rCFDeVj2 can be exploited through specially crafted Webex recording files that trigger arbitrary code execution.
The impacted products for cisco-sa-webex-player-rCFDeVj2 include Cisco Webex Network Recording Player and Cisco Webex Player.