SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco WebEx Meetings Server Vendors:   Cisco, WebEx
Cisco WebEx Meetings File Processing Flaw Lets Remote Authenticated Users Execute Arbitrary Code
SecurityTracker Alert ID:  1041942
SecurityTracker URL:  http://securitytracker.com/id/1041942
CVE Reference:   CVE-2018-15442   (Links to External Site)
Date:  Oct 24 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco WebEx Meetings. A remote authenticated user can cause arbitrary code to be executed on the target user's system.

A remote authenticated user can exploit a flaw in the update service of Cisco Webex Meetings Desktop App for Windows to update the service to execute arbitrary commands as a privileged System level user.

In Active Directory deployments, the vulnerability can be exploited remotely.

The vendor has assigned bug ID CSCvk70841 to this vulnerability.

Ron Bowes and Jeff McJunkin of Counter Hack reported this vulnerability.

The original advisories are available at:

https://webexec.org/
https://blog.skullsecurity.org/2018/technical-rundown-of-webexec

Impact:   A remote authenticated user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC