First published: Wed Jun 17 2020(Updated: )
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to gain unauthorized access to a vulnerable Webex site. The vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. If successful, the attacker could gain the privileges of another user within the affected Webex site. Cisco has released software updates that address this vulnerability. Customers on Cisco hosted Webex Meetings sites do not need to take any actions to receive this update. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-token-zPvEjKN
Credit: an anonymous external researcher.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client | ||
Cisco Webex Meetings Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-webex-token-zPvEjKN vulnerability has a high severity level due to its potential to allow unauthorized access.
To fix cisco-sa-webex-token-zPvEjKN, upgrade to the latest version of Cisco Webex Meetings or Cisco Webex Meetings Server as per Cisco's security advisory.
Cisco Webex Meetings and Cisco Webex Meetings Server users are affected by the cisco-sa-webex-token-zPvEjKN vulnerability.
The cisco-sa-webex-token-zPvEjKN vulnerability can be exploited by unauthenticated, remote attackers to gain unauthorized access to a vulnerable Webex site.
The cisco-sa-webex-token-zPvEjKN vulnerability was disclosed as part of a Cisco Security Advisory.