Cisco addressed a critical security vulnerability in Cisco Webex Meetings Suite sites and Online sites that allow an unauthenticated attacker to join password protected private meetings without the meeting password.
Cisco Webex technology is a platform to host online meetings anywhere, seminars anytime within organizations or outside.
The vulnerability can be exploited by an unauthenticated remote attacker by having the meeting ID or the meeting URL from the mobile device web browser.
Then the browser will launch the Webex mobile application installed in the device and the unauthorized attendee could join the meeting password-protected meeting.
“The unauthorized attendee will be visible in the attendee list of the meeting as a mobile attendee,” reads the Cisco blog post.
So it is easy to detect the unauthorized attendee because his entry will be shown as a mobile attendee and the attackers not able to mimic the presence.
The vulnerability has received a CVSS score of 7.2 out of 10 and it can be tracked as CVE-2020-3142. It was found Cisco during the resolution of TAC support case.
Cisco Product Security Incident Response Team (PSIRT) said that they are not aware of any attacks exploiting the vulnerability.
The vulnerability affects Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online versions earlier than 39.11.5 and 40.1.3. Also, Cisco confirms that Webex Meetings Server is not affected.
Now the Cisco released fixes for vulnerability with the release of versions 39.11.5 and later and 40.1.3 and later for Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites.
“The fix applies to Cisco Webex Meetings Suite sites and Cisco Webex Meetings sites only. Customers are not required to update the Cisco Webex Meetings mobile application or the Cisco Webex Meetings desktop application.”
Recently Cisco fixed 11 Bugs in Cisco Data Center Network Manager Let Hackers Perform RCE, SQL Injection, Authentication Bypass Attacks.
In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance…
A critical remote code execution vulnerability has been discovered in the git clone which was assigned with CVE-2024-32002 and the…
In a recent encounter, the Akira ransomware group exploited a novel privilege escalation technique, where the attackers infiltrated the victim's…
The U.S. Securities and Exchange Commission (SEC) has made changes to Regulation S-P that require financial companies to report data…
Two Chinese people have been arrested on suspicion of being involved in a complex cryptocurrency trading scam that stole more…
A proof-of-concept (PoC) exploit for a critical zero-day vulnerability (CVE-2024-4947) in Google Chrome has been made public. The potential for…