Cisco has released software updates for its WebEx Meetings Server product to address a couple of critical and high severity vulnerabilities that can be exploited remotely for arbitrary command execution and denial-of-service (DoS) attacks.
The critical flaw, tracked as CVE-2016-1482, is caused by insufficient sanitization of user-supplied data. An attacker can exploit it to execute arbitrary commands with elevated privileges by injecting the commands into existing application scripts running on a targeted device located in a DMZ (demilitarized) zone.
The high severity issue, identified as CVE-2016-1483, allows an unauthenticated attacker to cause a targeted device to enter a DoS condition by repeatedly attempting to access a specific service.
Both vulnerabilities affect WebEx Meetings Server version 2.6 and they have been addressed with the release of version 2.7. Cisco says it’s unaware of any instances where these flaws have been exploited for malicious purposes.
This is the second time Cisco updates its WebEx products in recent weeks to address serious vulnerabilities. The company recently patched critical and medium severity flaws in the WebEx Meetings Player.
Earlier this month, Cisco informed customers that a high severity vulnerability in its ACE30 Application Control Engine module and ACE 4700 series Application Control Engine appliances can be exploited for DoS attacks.
The company updated its initial advisory on Thursday to say that the issue will be resolved with the release of version A5(3.5), which is only expected to become available by November 30. What makes this vulnerability interesting is the fact that while it hasn’t been exploited for malicious purposes, it was triggered in some cases by a research project that scans the Internet for SSL/TLS servers.