Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-0379 CVE-2018-0380 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Webex Player Client/Desktop applications / Multimedia software Cisco WebEx Network Recording Player Client/Desktop applications / Multimedia software |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU13912
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0379
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files due to insufficient input validation. A remote unauthenticated attacker can supply a specially crafted .arf or .wrf file via email or URL, thick the victim into launching it in the Webex recording players and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate Cisco Webex Network Recording Player and Cisco Webex Player for Cisco Webex Meetings Suite to version 31.23, 32.15, 33.2 and later.
Update Webex Network Recording Player and WebEx Player for Cisco Webex Meetings Online to version 1.3.35 and later.
Update Webex Network Recording Player for Cisco Webex Meetings Server to version 3.0MR1 and later.
Webex Player: before 33.2
Cisco WebEx Network Recording Player: before 33.2
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13913
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0380
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files due to insufficient input validation. A remote unauthenticated attacker can supply a specially crafted .arf or .wrf file via email or URL, thick the victim into launching it in the Webex recording players and cause the service to crash.
MitigationInstall update from vendor's website.
Vulnerable software versionsWebex Player: All versions
Cisco WebEx Network Recording Player: All versions
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-dos
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.