—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco Webex Network Recording Players Remote Code Execution Vulnerabilities
Advisory ID: cisco-sa-20180718-webex-rce
Revision: 1.0
For Public Release: 2018 July 18 16:00 GMT
Last Updated: 2018 July 18 16:00 GMT
CVE ID(s): CVE-2018-0379
CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+———————————————————————
Summary
=======
Multiple vulnerabilities exist in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious .arf or .wrf file via email or URL and convincing the user to launch the file in the Webex recording players. Exploitation of these vulnerabilities could allow arbitrary code execution on the system of a targeted user. There is no risk when a .arf player that is stored on a Webex site is played in the Webex Network Recording Player.
The Cisco Webex players are applications that are used to play back Webex meetings that have been recorded by an online meeting attendee. The Webex Network Recording Player for .arf files can be automatically installed when the user accesses a recording that is hosted on a Webex server. The Webex Player for .wrf files can be downloaded manually.
Cisco has updated affected versions of the ARF and WRF recording players on Cisco Webex Meetings Suite sites, Cisco Webex Meetings Online sites, and Cisco Webex Meetings Server. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce”]
—–BEGIN PGP SIGNATURE—–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=VPsP
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com