Denial of service in Cisco Webex Centers



Published: 2020-01-09
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE ID CVE-2020-3116
CWE ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco WebEx Event Center
Client/Desktop applications / Office applications

Cisco Webex Support Center
Client/Desktop applications / Office applications

Cisco WebEx Meeting Center
Client/Desktop applications / Multimedia software

Cisco WebEx Training Center
Other software / Other software solutions

Vendor Cisco Systems, Inc

Security Advisory

This security advisory describes one medium risk vulnerability.

1) Input validation error

Risk: Medium

CVSSv3: 6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:U/RC:C] [PCI]

CVE-ID: CVE-2020-3116

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of Universal Communications Format UCF media files. A remote attacker can trick a victim to open a specially crafted UCF file and cause the application to quit unexpectedly.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco WebEx Event Center: -

Cisco WebEx Meeting Center: -

Cisco WebEx Training Center: -

Cisco Webex Support Center: -

CPE External links

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-centers-dos

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open an attachment in an e-mail message.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.