SB2018011811 - Multiple vulnerabilities in Cisco WebEx Meetings Server



SB2018011811 - Multiple vulnerabilities in Cisco WebEx Meetings Server

Published: January 18, 2018

Security Bulletin ID SB2018011811
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2018-0111)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to a design flaw in Cisco WebEx Meetings Server. A remote attacker can utilize available resources, study the customer network and discover sensitive data about the application that may be used to conduct additional reconnaissance attacks.


2) Information disclosure (CVE-ID: CVE-2018-0109)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The vulnerability exists due to a design flaw in Cisco WebEx Meetings Server. A remote attacker can access the root account and view sensitive information that may be used to conduct additional reconnaissance attacks.


3) XXE attack (CVE-ID: CVE-2018-0108)

The vulnerability allows a remote authenticated attacker to conduct XXE attack.

The vulnerability exists due to the ability of an attacker to perform an out-of-band XXE injection. A remote attacker can capture customer files and redirect them to another destination address to discover sensitive customer data.

Successful exploitation of the vulnerability results in information disclosure.


4) Improper access control (CVE-ID: CVE-2018-0110)

The vulnerability allows a remote authenticated attacker to access the remote support account even after it has been disabled via the web application.

The vulnerability exists due to a design flaw in Cisco WebEx Meetings Server. A remote attacker can connect to the remote support account, even after it had been disabled at the web application level, modify server configuration and gain access to customer data.


Remediation

Install update from vendor's website.