Denial of service in Cisco Webex Centers

Published: 2020-01-09
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2020-3116
Exploitation vector Network
Public exploit N/A
Vulnerable software
Cisco WebEx Event Center
Client/Desktop applications / Office applications

Cisco Webex Support Center
Client/Desktop applications / Office applications

Cisco WebEx Meeting Center
Client/Desktop applications / Multimedia software

Cisco WebEx Training Center
Other software / Other software solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Input validation error

EUVDB-ID: #VU24163

Risk: Medium

CVSSv3.1: 6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-3116

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No


The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of Universal Communications Format UCF media files. A remote attacker can trick a victim to open a specially crafted UCF file and cause the application to quit unexpectedly.


Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco WebEx Event Center: All versions

Cisco WebEx Meeting Center: All versions

Cisco WebEx Training Center: All versions

Cisco Webex Support Center: All versions

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.