@Cisco has fixed a critical vulnerability in its @WebEx #videoconferencing software that could be exploited to compromise meeting attendees’ systems by simply opening a booby-trapped Flash file shared in a meeting. About the vulnerability (CVE-2018-0112) The flaw is due to insufficient input validation by the Cisco WebEx clients, and affects Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server. (The Cisco WebEx Business Suite (WBS) meeting services and Cisco WebEx Meetings are a hosted multimedia conferencing solution that is managed and maintained by Cisco WebEx. The Cisco WebEx Meetings Server is a multimedia conferencing solution that customers can host in their private clouds. Customers download the WebEx client application to attend meetings on the various Cisco WebEx Centers.) “To exploit this vulnerability, the client application would require a meeting attendee to open a malicious Flash file. An attacker may be able to accomplish this exploit by providing the malicious .swf file directly to users via the file-sharing capabilities of the client,” Cisco explained in an advisory published on Wednesday. The good news is that it is not currently being exploited in the wild: it was discovered and reported to Cisco by Alexandros Zacharis, an officer in the European Union Agency for Network and Information Security (ENISA). There are no workarounds for the flaw, so users should either upgrade their software to the latest releases or remove it from their systems altogether. Other vulnerabilities fixed Cisco has also released on Wednesday a number of security updates for several of its security appliances and other software. Among the holes plugged is one affecting the company’s unified infrastructure management solution that simplifies data center operations. “A vulnerability in the role-based resource checking functionality of the Cisco Unified Computing System (UCS) Director could allow an authenticated, remote attacker to view unauthorized information for any virtual machine in the UCS Director end-user portal and perform any permitted operations on any virtual machine,” the company explained. “The vulnerability is due to improper user authentication checks. An attacker could exploit this vulnerability by logging in to the UCS Director with a modified username and valid password. A successful exploit could allow the attacker to gain visibility into and perform actions against all virtual machines in the UCS Director end-user portal of the affected system.”
https://www.helpnetsecurity.com/2018/04/19/cisco-webex-cve-2018-0112/
No comments:
Post a Comment