Security News > 2020 > November > Cisco Webex Vulnerability Allows Ghost Access to Meetings
Identified by IBM's security researchers, the Webex flaws could allow attackers to join meetings as ghosts, remain in the meeting as a ghost after being expelled, and access information on meeting attendees.
Tracked as CVE-2020-3419, the first of the issues impacts both Webex Meetings and Webex Meetings Server and is the result of "Improper handling of authentication tokens by a vulnerable Webex site."
An attacker with access to join a meeting could abuse the flaw by sending crafted requests to a vulnerable Webex Meetings site.
Webex Meetings 40.10.9 and earlier for iOS and Android are affected too, as well as Webex Meetings Server 3.0MR Security Patch 4 and earlier and 4.0MR3 Security Patch 3 and earlier.
"These vulnerabilities work by exploiting the handshake process that Webex uses to establish a connection between meeting participants. [] A malicious actor can become a ghost by manipulating [] messages during the handshake process between the Webex client application and the Webex server back-end to join or stay in a meeting without being seen by others," IBM explains.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-18 | CVE-2020-3419 | Improper Control of Dynamically-Managed Code Resources vulnerability in Cisco Webex Meetings Server A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. | 9.1 |