Wednesday, January 1, 2025
Homecyber securityCisco Webex Flaw Let Unauthenticated Remote Attackers to Join Private Meetings Without...

Cisco Webex Flaw Let Unauthenticated Remote Attackers to Join Private Meetings Without Password

Published on

SIEM as a Service

Cisco addressed a critical security vulnerability in Cisco Webex Meetings Suite sites and Online sites that allow an unauthenticated attacker to join password protected private meetings without the meeting password.

Cisco Webex technology is a platform to host online meetings anywhere, seminars anytime within organizations or outside.

Cisco Webex Meetings Vulnerability

The vulnerability can be exploited by an unauthenticated remote attacker by having the meeting ID or the meeting URL from the mobile device web browser.

- Advertisement - SIEM as a Service

Then the browser will launch the Webex mobile application installed in the device and the unauthorized attendee could join the meeting password-protected meeting.

“The unauthorized attendee will be visible in the attendee list of the meeting as a mobile attendee,” reads the Cisco blog post.

So it is easy to detect the unauthorized attendee because his entry will be shown as a mobile attendee and the attackers not able to mimic the presence.

The vulnerability has received a CVSS score of 7.2 out of 10 and it can be tracked as CVE-2020-3142. It was found Cisco during the resolution of TAC support case.

Cisco Product Security Incident Response Team (PSIRT) said that they are not aware of any attacks exploiting the vulnerability.

Vulnerable Versions

The vulnerability affects Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online versions earlier than 39.11.5 and 40.1.3. Also, Cisco confirms that Webex Meetings Server is not affected.

Now the Cisco released fixes for vulnerability with the release of versions 39.11.5 and later and 40.1.3 and later for Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites.

“The fix applies to Cisco Webex Meetings Suite sites and Cisco Webex Meetings sites only. Customers are not required to update the Cisco Webex Meetings mobile application or the Cisco Webex Meetings desktop application.”

Recently Cisco fixed 11 Bugs in Cisco Data Center Network Manager Let Hackers Perform RCE, SQL Injection, Authentication Bypass Attacks.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed...

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed...

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs,...