Connect with us

Hi, what are you looking for?



Cisco Patches Remote Code Execution Flaws in Webex Player

Cisco has released patches to address more than a dozen vulnerabilities across various products, including two code execution bugs in Webex Player that could be exploited remotely. 

Cisco has released patches to address more than a dozen vulnerabilities across various products, including two code execution bugs in Webex Player that could be exploited remotely. 

Tracked as CVE-2020-3127 and CVE-2020-3128 and rated high severity (CVSS score 7.8), the issues reside in the insufficient validation of elements within a Webex recording stored as ARF (Advanced Recording Format) or WRF (Webex Recording Format).

To exploit the bugs, an attacker needs to send a malicious ARF or WRF file and trick the victim into opening the file the local system, which could result in arbitrary code being executed with the privileges of the targeted user.

The flaws impact Webex Meetings (Webex Network Recording Player and Webex Player versions prior to WBS 39.5.17 or WBS 39.11.0), Webex Meetings Online (Webex Network Recording Player and Webex Player releases earlier than 1.3.49), and Webex Meetings Server (Webex Network Recording Player releases earlier than 3.0MR3SecurityPatch1 and 4.0MR2SecurityPatch2). 

Cisco says there are no workarounds to mitigate these flaws, but security updates to address them have been released. The company is not aware of exploitation attempts targeting the bugs. 

Today, the company also released an advisory for a high risk flaw in the SSL implementation of the Intelligent Proximity solution. Tracked as CVE-2020-3155 (CVSS score 7.4), the issue could be exploited remotely to view or alter information shared on Webex video devices and Cisco collaboration endpoints. 

The bug exists due to the lack of validation of the SSL server certificate received when connecting to a Webex video device or a Cisco collaboration endpoint. A man in the middle (MITM) attacker could intercept the traffic between the client and an endpoint, and view presentations or modify content sent to the victim. 

Advertisement. Scroll to continue reading.

Cisco products impacted by the bug include Intelligent Proximity application, Jabber, Webex Meetings, Webex Teams, and Meeting App and no software updates are available to address the issue. As mitigation, Cisco encourages disabling the Proximity pairing feature (it cannot be disabled in the Meeting App). 

A third high severity flaw addressed today impacts the web-based interface of Prime Network Registrar (CPNR) and could allow a remote attacker to launch a cross-site request forgery (CSRF) attack without authentication. Tracked as CVE-2020-3148, the bug features a CVSS score of 7.1.

An attacker able to successfully exploit the bug could change device configuration to, among others, edit or create user accounts of any privilege level. Cisco has released patches to address the vulnerability. 

Today, the company also published advisories for nine medium severity vulnerabilities that could lead to information disclosure, cross-site scripting (XSS), command execution, denial of service, or resource exhaustion. 

The bugs impact Webex Meetings Client for MacOS, TelePresence Management Suite, Remote PHY Device Software, Prime Collaboration Provisioning, Identity Services Engine (ISE), IOS XR Software, AsyncOS Software for Email Security Appliances (ESAs), and ESA, Web Security Appliance (WSA), and Content Security Management Appliance (SMA).

Cisco says it is not aware of exploitation attempts targeting the bugs. The company has published details on these vulnerabilities on its support website.

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.