First published: Wed Jan 13 2021(Updated: )
A vulnerability in Cisco Jabber and Cisco Webex (formerly Teams) could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99
Credit: Hou JingYi Qihoo 360 CERT
Affected Software | Affected Version | How to fix |
---|---|---|
Jabber Server | ||
Cisco Webex Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-teams-7ZMcXG99 is considered high due to the potential for remote exploitation.
To fix cisco-sa-webex-teams-7ZMcXG99, ensure that you update Cisco Jabber and Cisco Webex to the latest versions provided by Cisco.
cisco-sa-webex-teams-7ZMcXG99 affects Cisco Jabber and Cisco Webex messaging interface.
Yes, an unauthenticated remote attacker can exploit cisco-sa-webex-teams-7ZMcXG99.
cisco-sa-webex-teams-7ZMcXG99 is associated with attacks that manipulate file names within the messaging interface.