Executive Summary

Title Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities
Name cisco-sa-20190515-webex-player First vendor Publication 2019-05-15
Vendor Cisco Last vendor Modification 2019-05-15
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Multiple vulnerabilities in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system.

The vulnerabilities exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. No exploit code proving exploitability of the vulnerabilities is publicly available.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player"]


iQJ5BAEBAgBjBQJc3Dq/XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczcd8P/jRDVfR6iAZQhvzXAfawFFwB4i8E 9Z1JXk8/nDMk05hRi+BhRbxL3WBa7H1rtQX4Fe15EM9uJH9TimraRdExraFG7Pse Qve6GFOaooDTm0L+nCwza0jLYpvs5WjWu9qVqxWaiMsKUry/KP1C52gDycYaGH8M ZcAMhMJPWYgM/efIPVLK03CzlidrcVn/6ysKmktkzeFrtksNMAy7Pw5rLLUquv5z k9CVZPL9NXFKxCi4fhaCkB0h9nlS+hBMij5ByyllKbot89uUvCPO2GIyPiuv6/zM ka/lQjBNRwXwUt2IO0eu45fq3lHQnhdg15sRyASe7J2m/d361f788190K4pG/5X1 2vT1OK/l+XrTJuB9b2dNS1cWcKal80rETqK4UWSxg7GmKLlLG2EmrB6AsrfrhPYW MQudHoNq+OpXqrHyiShHNDGneV9pRvfou2TXg1H7qT2wYCoPoB/dV6/upuNnyR6R b/JndgPpiDfZ/NDLEdJF9VfgncafmgbLJzRzZViQIg9AvZLNrnF3rnBVIkPhpAiZ qfQ+b5lpdzKIU48eKkNkuGJWWGN2+9PEWC+ml3WIc/km4vPLTNhLHBlNqtGe0cy +3k/S2gZ0m6+6D8zJTuuw9s2SGIpOVfRAtUY9XGJnF9t4Gu5sVflEe20PP0gHh11k W63ncpZVABcIpfum =RXTF END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

Application 10
Application 1
Application 23
Application 117

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-05-20 21:21:46
  • Multiple Updates
2019-05-16 05:21:14
  • Multiple Updates
2019-05-15 21:18:37
  • First insertion