You are here
Home > Preporuke > Ranjivost Cisco Webex Meetings Desktop softvera

Ranjivost Cisco Webex Meetings Desktop softvera

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Webex Meetings Desktop App Update Service Command Injection Vulnerability

Advisory ID: cisco-sa-20181024-webex-injection

Revision: 2.0

For Public Release: 2018 October 24 16:00 GMT

Last Updated: 2018 November 27 16:01 GMT

CVE ID(s): CVE-2018-15442

CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.

The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.

While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

After an additional attack method was reported to Cisco, the previous fix for this vulnerability was determined to be insufficient. A new fix was developed, and the advisory was updated on November 27, 2018, to reflect which software releases include the complete fix.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection”]

—–BEGIN PGP SIGNATURE—–
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=l1Op
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorToni Vugdelija
Cert idNCERT-REF-2018-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa gettext

Otkriven je sigurnosni nedostatak u programskom paketu gettext za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close