Executive Summary

TitleCisco Webex Meetings Desktop App Update Service Command Injection Vulnerability
Namecisco-sa-20181024-webex-injectionFirst vendor Publication2018-10-24
VendorCiscoLast vendor Modification2018-10-24
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores


A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.

The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.

While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

After an additional attack method was reported to Cisco, the previous fix for this vulnerability was determined to be insufficient. A new fix was developed, and the advisory was updated on November 27, 2018, to reflect which software releases include the complete fix.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection"]


iQJ5BAEBAgBjBQJb/Wx8XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfcz/asP/0Mvyp2IDJsQoGSZQdIY7RTBa4cz d/eatRFt4smZQdOSqVyWrIhpYcc/aabGXzCtw5vlGtVTADLL62UAqGjQelFvnkyU RMcXsQ2QZBo4BEo3aURzdmooEi76//jOVDcAT/YKw40YxtDosv0pbZaHZO+SQNf9 GLRxYe9uFsDP+g+NbWVuWIo4ltZfz2DKRpJY7+xI75NIO7XiJDDDb+Y/llLBgssk y55/WHnzg/xxbomr1B8z9wm1aRBhmlUEVR6Xdp728H9OxK2SuQfJe2oQ0vB5rv+B e5OG8RgRj203pTEEQeklNcw4crAY9EQZl0WTvwE3KlDbL2/3p7N6fyst7Rp2rasK usBTXLjv4npu56PPIlzEC7/+8wkAH7Bx8mfN2fiGn+LuCTXDamtbVUMfxW7w49AI WF59UCBeKHOHtuUIjRMerNCATBJQfDf+lqSGPJtpfdASJAJMPE8YSoGxYbeRpBWy PgmCpez6IG9sQOb2z5JOGMplbunvkRNW/4OS8F1zSS+KJOxq+S4/1af5+efRKVUk CSkOcz1YKk6isn0TLKx2Ev70/6Kk9a442pwXIf5N89qadRMPVDvTLFc+LsDMPj/P ZRwcOHabsycsM7ovAd5Auzq8bmy1M4golZFMYQkhgqhQHzi/+Lp8gE981LDPhn8i sJtyvjZOCRD3pYW6 =l1Op END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

Snort® IPS/IDS

2018-11-27Cisco WebEx WebExService.exe remote code execution attempt
RuleID : 48241 - Revision : 1 - Type : NETBIOS

Alert History

If you want to see full details history, please login or register.
2018-11-27 17:19:21
  • Multiple Updates
2018-10-25 00:22:14
  • Multiple Updates
2018-10-24 21:18:51
  • First insertion