Cisco Webex Meetings and Cisco Webex Meetings Server Token Handling Unauthorized Access Vulnerability

A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to gain unauthorized access to a vulnerable Webex site.

The vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. If successful, the attacker could gain the privileges of another user within the affected Webex site.

Cisco has released software updates that address this vulnerability. Customers on Cisco hosted Webex Meetings sites do not need to take any actions to receive this update. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-token-zPvEjKN

Security Impact Rating: High

CVE: CVE-2020-3361

Related:

  • No Related Posts

Cisco Webex Meetings Suite and Cisco Webex Meetings Online Unauthenticated Meeting Join Vulnerability

[CVE-2020-3142_su]

A vulnerability in Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could allow an unauthenticated, remote attendee to join a password-protected meeting without providing the meeting password. The connection attempt must initiate from a Webex mobile application for either iOS or Android.

The vulnerability is due to unintended meeting information exposure in a specific meeting join flow for mobile applications.
An unauthorized attendee could exploit this vulnerability by accessing a known meeting ID or meeting URL from the mobile device’s web browser. The browser will then request to launch the device’s Webex mobile application. A successful exploit could allow the unauthorized attendee to join the
password-protected meeting. The unauthorized attendee will be visible in the attendee list of the meeting as a mobile attendee.

Cisco has applied updates that address this vulnerability and no user action is required. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200124-webex-unauthjoin

[/CVE-2020-3142_su]

Security Impact Rating: High

CVE: CVE-2020-3142

Related:

  • No Related Posts

Cisco Webex Teams Adaptive Cards Denial of Service Vulnerability

[CVE-2020-3131_su]

A vulnerability in the Cisco Webex Teams client for Windows could allow an authenticated, remote attacker to cause the client to crash, resulting in a denial of service (DoS) condition. The attacker needs a valid developer account to exploit this vulnerability.

The vulnerability is due to insufficient input validation when processing received adaptive cards. The attacker could exploit this vulnerability by sending an adaptive card with malicious content to an existing user of the Cisco Webex Teams client for Windows. A successful exploit could allow the attacker to cause the targeted user’s client to crash continuously.

Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cards-dos-FWzNcXPq

[/CVE-2020-3131_su]

Security Impact Rating: Medium

CVE: CVE-2020-3131

Related:

  • No Related Posts

ShareConnect Mobile Viewer

You can access host computers via the ShareConnect mobile app for iOS and Android.

Note – Multiple monitors cannot be viewed from the ShareConnect mobile app.

Connect to a Computer

Log in to your ShareConnect account. Select the View Files button beside the computer you want to remotely access and enter your system’s credentials.

You will see the following on the ShareConnect Mobile Viewer:

Remote Computer – The computer that you are connected to remotely.

Search – Ability to search for files or apps within a folder.

Recent Files – The 10 most recently used files.

Applications – All applications present on your host computer. By default, you will see a couple of browsers and Microsoft Office applications.

Folders – A list of all folders in your remote computer.

Files List – A table list of the files with details.

You can also remotely access your host computer by clicking Show Desktop under your computer’s name in the left navigation.

You can disconnect from your host computer by clicking Disconnect your host computer’s name. You will be redirected to the My Computer’s page.


The ShareConnect Mobile Viewer Toolbar

When you connect remotely to a host computer to begin a ShareConnect session, the ShareConnect Viewer toolbar helps you with performing certain actions on your remote computer. The toolbar is located in the right navigation of your Viewer screen.

In addition to helping you on your remote computer, you can apply security settings to your host computer.

Search – Search within files and folders available on your remote computer.

Maximize – Displays the remote computer screen in 100% size.

FIT – Displays the remote computer within your ShareConnect Viewer window.

Zoom – Performs the zoom out and zoom in functionality respectively.

Full screen – Displays the remote computer in full screen mode.

Ctrl Alt Del – Sends the Ctrl-Alt-Del command to the remote computer

Windows – Sends the Windows command to the remote computer.

Leave Session – Ends your ShareConnect remote session.

Security Settings – Apply security settings to blank your remote computer’s screen and lock keyboard & mouse action in-session

User-added image

Related:

  • No Related Posts

Cisco WebEx Centers Username Enumeration Information Disclosure Vulnerability

A vulnerability in web interface of the Cisco Webex Event Center, Cisco Webex Meeting Center, Cisco Webex Support Center, and Cisco Webex Training Center could allow an unauthenticated, remote attacker to guess account usernames.

The vulnerability is due to missing CAPTCHA protection in certain URLs. An attacker could exploit this vulnerability by sending a crafted request to the web interface. A successful exploit could allow the attacker to know if a given username is valid and find the real name of the user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-webex-centers-infodis

Security Impact Rating: Medium

CVE: CVE-2019-15987

Related:

endpoint server migration(15.0MP1)—> 15.1MP2

I need a solution

Folks,

I have a situation where, I need to move an existing endpoint servers(with reporting agents) from 15.0MP1 application server  to a 15.1MP2 app server. Is there any way I can preserve  the transfer of the configurations of the  endpoint server(15.0MP1)  during my ugrade to 15.1MP1 or MP2 to register it to the new Enforce server(15.1MP2)?

0

Related:

Cisco Webex Meetings Enumeration Attack

Cisco Webex Meetings is an enterprise solution for hosting online meetings that offers video conferencing, screen sharing, and webinar capabilities that support hundreds of participants. Cisco Webex Meetings utilizes a nine-digit number as a user-friendly meeting identifier that can be easily typed in to join a meeting from all types of endpoints.

On July 24th, 2019, Shreyans Mehta of Cequence Security and the CQ Prime Research Team reported to Cisco that an attacker could take advantage of one of the Webex Meetings API calls to enumerate all the meeting numbers in use by an organization on the platform at a certain moment in time.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191001-webex-enum

Security Impact Rating: Informational

Related: