First published: Wed Nov 04 2020(Updated: )
A vulnerability in virtualization channel messaging in Cisco Webex Meetings Desktop App for Windows could allow a local attacker to execute arbitrary code on a targeted system. This vulnerability occurs when this app is deployed in a virtual desktop environment and using virtual environment optimization. This vulnerability is due to improper validation of messages processed by the Cisco Webex Meetings Desktop App. A local attacker with limited privileges could exploit this vulnerability by sending malicious messages to the affected software by using the virtualization channel interface. A successful exploit could allow the attacker to modify the underlying operating system configuration, which could allow the attacker to execute arbitrary code with the privileges of a targeted user. Note: This vulnerability can be exploited only when Cisco Webex Meetings Desktop App is in a virtual desktop environment on a hosted virtual desktop (HVD) and is configured to use the Cisco Webex Meetings virtual desktop plug-in for thin clients. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-vdi-qQrpBwuJ
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-webex-vdi-qQrpBwuJ is considered high due to the potential for local attackers to execute arbitrary code.
To fix cisco-sa-webex-vdi-qQrpBwuJ, update your Cisco Webex Meetings Desktop App to the latest version provided by Cisco.
The vulnerability affects users of the Cisco Webex Meetings Desktop App when deployed in a virtual desktop environment.
cisco-sa-webex-vdi-qQrpBwuJ is a local code execution vulnerability related to virtualization channel messaging in the Cisco Webex Meetings Desktop App.
No, cisco-sa-webex-vdi-qQrpBwuJ requires local access to the targeted system to be exploited.