—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities
Advisory ID: cisco-sa-20190515-webex-player
Revision: 1.0
For Public Release: 2019 May 15 16:00 GMT
Last Updated: 2019 May 15 16:00 GMT
CVE ID(s): CVE-2019-1771, CVE-2019-1772, CVE-2019-1773
CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+———————————————————————
Summary
=======
Multiple vulnerabilities in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system.
The vulnerabilities exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. No exploit code proving exploitability of the vulnerabilities is publicly available.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player”]
—–BEGIN PGP SIGNATURE—–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=RXTF
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com