First published: Wed Jun 02 2021(Updated: )
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to redirect users to a malicious file. This vulnerability is due to improper validation of URL paths in the application interface. An attacker could exploit this vulnerability by persuading a user to follow a specially crafted URL that is designed to cause Cisco Webex Meetings to include a remote file in the web UI. A successful exploit could allow the attacker to cause the application to offer a remote file to a user, which could allow the attacker to conduct further phishing or spoofing attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-redirect-XuZFU3PH
Credit: Alexandros Zacharis ENISA
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client | ||
Cisco Webex Meetings Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-redirect-XuZFU3PH is rated as high due to the potential for unauthorized redirection to malicious files.
To fix cisco-sa-webex-redirect-XuZFU3PH, update your Cisco Webex Meetings or Webex Meetings Server to the latest available version provided by Cisco.
Cisco Webex Meetings and Cisco Webex Meetings Server users are affected by the vulnerability identified as cisco-sa-webex-redirect-XuZFU3PH.
cisco-sa-webex-redirect-XuZFU3PH enables an unauthenticated remote attacker to redirect users to malicious files.
The cisco-sa-webex-redirect-XuZFU3PH vulnerability is caused by improper validation of URL paths in the Cisco Webex applications.