Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-00829

Опубликовано: 05 сент. 2018
Источник: fstec
CVSS3: 7.3
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость программного обеспечения для веб-конференцсвязи Cisco Webex Meetings Suite, Cisco Webex Meetings и Cisco Webex Meetings Server связана с недостатками разграничения доступа. Эксплуатация уязвимости может позволить нарушителю, выполнить произвольный код

Вендор

Cisco Systems Inc.

Наименование ПО

Webex Meetings Suite WBS32 Sites
Webex Meetings Suite WBS33 Sites
WebEx Meetings Server
Webex Meetings Suite WBS31 Sites
WebEx Meetings

Версия ПО

до 32.15.20 (Webex Meetings Suite WBS32 Sites)
до 33.4 (Webex Meetings Suite WBS33 Sites)
до 3.0MR2 (WebEx Meetings Server)
до 31.20 включительно (Webex Meetings Suite WBS31 Sites)
до 1.3.37 (WebEx Meetings)

Тип ПО

Прикладное ПО информационных систем
Сетевое программное средство

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,3)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 63%
0.00438
Низкий

7.3 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.3
nvd
больше 7 лет назад

A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user. The vulnerability is due to folder permissions that grant a user the permission to read, write, and execute files in the Webex folders. An attacker could exploit this vulnerability to write malicious files to the Webex client directory, affecting all other users of the targeted device. A successful exploit could allow a user to execute commands with elevated privileges. Attacks on single-user systems are less likely to occur, as the attack must be carried out by the user on the user's own system. Multiuser systems have a higher risk of exploitation because folder permissions have an impact on all users of the device. For an attacker to exploit this vulnerability successfully, a second user must execute the locally installed malicious file to allow remot

CVSS3: 7.3
github
больше 3 лет назад

A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user. The vulnerability is due to folder permissions that grant a user the permission to read, write, and execute files in the Webex folders. An attacker could exploit this vulnerability to write malicious files to the Webex client directory, affecting all other users of the targeted device. A successful exploit could allow a user to execute commands with elevated privileges. Attacks on single-user systems are less likely to occur, as the attack must be carried out by the user on the user's own system. Multiuser systems have a higher risk of exploitation because folder permissions have an impact on all users of the device. For an attacker to exploit this vulnerability successfully, a second user must execute the locally installed malicious file to allow re...

EPSS

Процентиль: 63%
0.00438
Низкий

7.3 High

CVSS3

6.8 Medium

CVSS2