Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
TitleCisco Webex Meetings Desktop App Update Service Command Injection Vulnerability
Informations
Namecisco-sa-20181024-webex-injectionFirst vendor Publication2018-10-24
VendorCiscoLast vendor Modification2018-10-24
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.

The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.

While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

After an additional attack method was reported to Cisco, the previous fix for this vulnerability was determined to be insufficient. A new fix was developed, and the advisory was updated on November 27, 2018, to reflect which software releases include the complete fix.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJb/Wx8XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfcz/asP/0Mvyp2IDJsQoGSZQdIY7RTBa4cz d/eatRFt4smZQdOSqVyWrIhpYcc/aabGXzCtw5vlGtVTADLL62UAqGjQelFvnkyU RMcXsQ2QZBo4BEo3aURzdmooEi76//jOVDcAT/YKw40YxtDosv0pbZaHZO+SQNf9 GLRxYe9uFsDP+g+NbWVuWIo4ltZfz2DKRpJY7+xI75NIO7XiJDDDb+Y/llLBgssk y55/WHnzg/xxbomr1B8z9wm1aRBhmlUEVR6Xdp728H9OxK2SuQfJe2oQ0vB5rv+B e5OG8RgRj203pTEEQeklNcw4crAY9EQZl0WTvwE3KlDbL2/3p7N6fyst7Rp2rasK usBTXLjv4npu56PPIlzEC7/+8wkAH7Bx8mfN2fiGn+LuCTXDamtbVUMfxW7w49AI WF59UCBeKHOHtuUIjRMerNCATBJQfDf+lqSGPJtpfdASJAJMPE8YSoGxYbeRpBWy PgmCpez6IG9sQOb2z5JOGMplbunvkRNW/4OS8F1zSS+KJOxq+S4/1af5+efRKVUk CSkOcz1YKk6isn0TLKx2Ev70/6Kk9a442pwXIf5N89qadRMPVDvTLFc+LsDMPj/P ZRwcOHabsycsM7ovAd5Auzq8bmy1M4golZFMYQkhgqhQHzi/+Lp8gE981LDPhn8i sJtyvjZOCRD3pYW6 =l1Op END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

%idName
100 %CWE-78Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

Snort® IPS/IDS

DateDescription
2018-11-27Cisco WebEx WebExService.exe remote code execution attempt
RuleID : 48241 - Revision : 1 - Type : NETBIOS

Nessus® Vulnerability Scanner

DateDescription
2018-12-27Name : The remote host contains an application affected by a command injection vulne...
File : cisco_webex_meetings_win_33_6_4.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-01-28 17:21:18
  • Multiple Updates
2018-11-27 17:19:21
  • Multiple Updates
2018-10-25 00:22:14
  • Multiple Updates
2018-10-24 21:18:51
  • First insertion