Search criteria

57 vulnerabilities found for webex_teams by cisco

FKIE_CVE-2025-20236

Vulnerability from fkie_nvd - Published: 2025-04-16 17:15 - Updated: 2025-08-01 21:03
Summary
A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.
Impacted products
Vendor Product Version
cisco webex_teams 44.6
cisco webex_teams 44.6.0.29928
cisco webex_teams 44.6.0.30148
cisco webex_teams 44.7
cisco webex_teams 44.7.0.30141
cisco webex_teams 44.7.0.30285

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:44.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9E10AD-114B-411E-A182-F39A1D5184B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:44.6.0.29928:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F50C1B2-3CFD-4E1D-90B7-DCF7A7964BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:44.6.0.30148:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C400944-89FD-4CB6-8144-BA38B70AC600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:44.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A95726-827F-47AC-B361-CCFFCAA6C6DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:44.7.0.30141:*:*:*:*:*:*:*",
              "matchCriteriaId": "B36E21E9-26E6-4C93-93A9-3FEB913660CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:44.7.0.30285:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B2C0570-6468-4907-A9A8-0E16D13AE7EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.\r\n\r\nThis vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el analizador de URL personalizado de Cisco Webex App podr\u00eda permitir que un atacante remoto no autenticado persuada a un usuario para que descargue archivos arbitrarios, lo que podr\u00eda permitirle ejecutar comandos arbitrarios en el host del usuario objetivo. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente cuando Cisco Webex App procesa un enlace de invitaci\u00f3n a una reuni\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario para que haga clic en un enlace de invitaci\u00f3n a una reuni\u00f3n manipulado y descargue archivos arbitrarios. Una explotaci\u00f3n exitosa podr\u00eda permitirle ejecutar comandos arbitrarios con los privilegios del usuario objetivo."
    }
  ],
  "id": "CVE-2025-20236",
  "lastModified": "2025-08-01T21:03:51.873",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-16T17:15:49.573",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-829"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2020-26067

Vulnerability from fkie_nvd - Published: 2024-11-18 17:15 - Updated: 2025-08-01 20:34
Summary
A vulnerability in the web-based interface of Cisco Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Impacted products
Vendor Product Version
cisco webex_teams *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D78AB0F-AD39-46DE-AE43-D9DABE24DF8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based interface of Cisco\u0026nbsp;Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks.\r\nThe vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz basada en web de Cisco Webex Teams podr\u00eda permitir que un atacante remoto autenticado realice ataques de cross-site scripting. La vulnerabilidad se debe a una validaci\u00f3n incorrecta de los nombres de usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad creando una cuenta que contenga contenido HTML o script malicioso y uni\u00e9ndose a un espacio utilizando el nombre de cuenta malicioso. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar ataques de cross-site scripting y potencialmente obtener acceso a informaci\u00f3n confidencial basada en el navegador. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad."
    }
  ],
  "id": "CVE-2020-26067",
  "lastModified": "2025-08-01T20:34:27.470",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "psirt@cisco.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-18T17:15:09.757",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-80"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-20396

Vulnerability from fkie_nvd - Published: 2024-07-17 17:15 - Updated: 2025-07-31 16:07
Summary
A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests.
Impacted products
Vendor Product Version
cisco webex_teams 3.0.13464.0
cisco webex_teams 3.0.13538.0
cisco webex_teams 3.0.13588.0
cisco webex_teams 3.0.14154.0
cisco webex_teams 3.0.14234.0
cisco webex_teams 3.0.14375.0
cisco webex_teams 3.0.14741.0
cisco webex_teams 3.0.14866.0
cisco webex_teams 3.0.15015.0
cisco webex_teams 3.0.15036.0
cisco webex_teams 3.0.15092.0
cisco webex_teams 3.0.15131.0
cisco webex_teams 3.0.15164.0
cisco webex_teams 3.0.15221.0
cisco webex_teams 3.0.15333.0
cisco webex_teams 3.0.15410.0
cisco webex_teams 3.0.15485.0
cisco webex_teams 3.0.15645.0
cisco webex_teams 3.0.15711.0
cisco webex_teams 3.0.16040.0
cisco webex_teams 3.0.16269.0
cisco webex_teams 3.0.16273.0
cisco webex_teams 3.0.16285.0
cisco webex_teams 42.1.0.21190
cisco webex_teams 42.2.0.21338
cisco webex_teams 42.2.0.21486
cisco webex_teams 42.3.0.21576
cisco webex_teams 42.4.1.22032
cisco webex_teams 42.5.0.22259
cisco webex_teams 42.6.0.22565
cisco webex_teams 42.6.0.22645
cisco webex_teams 42.7.0.22904
cisco webex_teams 42.7.0.23054
cisco webex_teams 42.8.0.23214
cisco webex_teams 42.8.0.23281
cisco webex_teams 42.9.0.23494
cisco webex_teams 42.10.0.23814
cisco webex_teams 42.11.0.24187
cisco webex_teams 42.12.0.24485
cisco webex_teams 43.1.0.24716
cisco webex_teams 43.2.0.25157
cisco webex_teams 43.2.0.25211
cisco webex_teams 43.3.0.25468
cisco webex_teams 43.4.0.25788

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.13464.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "A0731376-1EF1-4361-89D9-6B2C0B64370E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.13538.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "8289243E-6CEC-43EC-B65C-9EA5E909D951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.13588.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "F25EF33F-1164-4A67-B60B-EB6467DE9D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14154.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "C66338FC-7D39-459A-A42B-E26E9181C436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14234.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "8C1AAA94-BE6C-4092-8770-F2F646B79E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14375.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FA788BAC-1DC0-42E4-BA10-2A89934E84F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14741.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "A6DDBEE5-D11F-4BFF-9A5C-028407FBAA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14866.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "4499D4FB-FC7C-4974-8343-57B2CAE63136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15015.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "E7CA0AAA-E188-4750-81B1-39B191551FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15036.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "90657271-CDE4-4BCE-9382-0CF7A93B97D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15092.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "9E2928B4-6CA9-4CB4-9AAB-036974746EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15131.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "5134AE77-8890-422F-8328-0676FB4D863C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15164.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "B72A2ADC-98EE-4EE2-8EDD-8D24432526AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15221.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FB34AF13-AACA-450A-B55B-91D87AE36453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15333.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "50B3FEE3-C3F2-4134-931F-CAD806F87156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15410.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "4E2C3B35-124E-45B7-9EBC-EF1507CAAEC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15485.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "6483C20E-E95D-443E-9C0E-8FFA0A54292D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15645.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "AA1D8B71-94F1-438B-98FD-2F7A17CF7663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15711.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FC5DC5E2-4FAB-4C7C-915F-0310A85A90B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16040.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "33A4716E-0A8E-450C-8A23-99EC4818CA8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16269.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FFD800A7-5E0A-463D-95F8-543DBECCCB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16273.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "57EBA9CF-6588-40D1-BF98-A3189E0BD8AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16285.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "44405865-5EE6-4AFE-BE55-ED149A614C1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.1.0.21190:*:*:*:*:-:*:*",
              "matchCriteriaId": "BDC16500-BE29-4F48-B10F-CF1A5E5170BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.2.0.21338:*:*:*:*:-:*:*",
              "matchCriteriaId": "DC462FE6-D300-4A60-9A39-366420CA2930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.2.0.21486:*:*:*:*:-:*:*",
              "matchCriteriaId": "A3C5E73E-6AFE-4A40-920A-7C511477AAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.3.0.21576:*:*:*:*:-:*:*",
              "matchCriteriaId": "8671E430-9610-475B-A42B-23D9B389531F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.4.1.22032:*:*:*:*:-:*:*",
              "matchCriteriaId": "B6C446D7-7700-448A-B9CE-99F8E4E5D119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.5.0.22259:*:*:*:*:-:*:*",
              "matchCriteriaId": "6A5BBD96-10D5-4E7D-92D5-924C87146450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.6.0.22565:*:*:*:*:-:*:*",
              "matchCriteriaId": "0933FFB3-20B9-4911-868B-27A6ACBE1E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.6.0.22645:*:*:*:*:-:*:*",
              "matchCriteriaId": "9BFA48AE-1685-407B-8917-7F277657D3D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.7.0.22904:*:*:*:*:-:*:*",
              "matchCriteriaId": "61DAC3AC-AE37-43C3-B65C-CC513E90E069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.7.0.23054:*:*:*:*:-:*:*",
              "matchCriteriaId": "DC18AF9B-AC2F-4183-8021-BF08026FA33B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.8.0.23214:*:*:*:*:-:*:*",
              "matchCriteriaId": "798FCD25-77F4-4625-91D5-E1BBE353B7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.8.0.23281:*:*:*:*:-:*:*",
              "matchCriteriaId": "CF286711-7D09-4125-BDCE-6FCC520A54B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.9.0.23494:*:*:*:*:-:*:*",
              "matchCriteriaId": "1EB7D461-BFF7-4D4A-A6B4-BCF290379076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.10.0.23814:*:*:*:*:-:*:*",
              "matchCriteriaId": "E4B6854B-7843-4FBF-81AA-ABA6145F8458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.11.0.24187:*:*:*:*:-:*:*",
              "matchCriteriaId": "1C54D0AC-F9EC-4FA7-9BA6-6DBDC3743C64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.12.0.24485:*:*:*:*:-:*:*",
              "matchCriteriaId": "5FB14348-E1EE-43E6-A66E-23B78E805DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.1.0.24716:*:*:*:*:-:*:*",
              "matchCriteriaId": "F0AA0F07-C8DF-4AC1-8799-0D2612FA65E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.2.0.25157:*:*:*:*:-:*:*",
              "matchCriteriaId": "EAC1AE74-F875-4161-95A3-102E5AC35015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.2.0.25211:*:*:*:*:-:*:*",
              "matchCriteriaId": "60571D58-E948-4F17-9A9B-7F853D85C995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.3.0.25468:*:*:*:*:-:*:*",
              "matchCriteriaId": "5356285B-A3C2-45D2-BE88-41B3F27DD294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.4.0.25788:*:*:*:*:-:*:*",
              "matchCriteriaId": "ED47DCB3-FABB-4AAE-A565-09A13693E5F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\n\r This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en los controladores de protocolo de la aplicaci\u00f3n Cisco Webex podr\u00eda permitir que un atacante remoto no autenticado obtenga acceso a informaci\u00f3n confidencial. Esta vulnerabilidad existe porque la aplicaci\u00f3n afectada no maneja de forma segura los controladores de protocolo de archivos. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario para que siga un v\u00ednculo manipulado para hacer que la aplicaci\u00f3n env\u00ede solicitudes. Si el atacante puede observar el tr\u00e1fico transmitido en una posici\u00f3n privilegiada de la red, una explotaci\u00f3n exitosa podr\u00eda permitirle capturar informaci\u00f3n confidencial, incluida informaci\u00f3n de credenciales, de las solicitudes."
    }
  ],
  "id": "CVE-2024-20396",
  "lastModified": "2025-07-31T16:07:49.463",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-17T17:15:13.070",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-20395

Vulnerability from fkie_nvd - Published: 2024-07-17 17:15 - Updated: 2025-07-31 16:04
Summary
A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information. This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user.
Impacted products
Vendor Product Version
cisco webex_teams 3.0.13464.0
cisco webex_teams 3.0.13538.0
cisco webex_teams 3.0.13588.0
cisco webex_teams 3.0.14154.0
cisco webex_teams 3.0.14234.0
cisco webex_teams 3.0.14375.0
cisco webex_teams 3.0.14741.0
cisco webex_teams 3.0.14866.0
cisco webex_teams 3.0.15015.0
cisco webex_teams 3.0.15036.0
cisco webex_teams 3.0.15092.0
cisco webex_teams 3.0.15131.0
cisco webex_teams 3.0.15164.0
cisco webex_teams 3.0.15221.0
cisco webex_teams 3.0.15333.0
cisco webex_teams 3.0.15410.0
cisco webex_teams 3.0.15485.0
cisco webex_teams 3.0.15645.0
cisco webex_teams 3.0.15711.0
cisco webex_teams 3.0.16040.0
cisco webex_teams 3.0.16269.0
cisco webex_teams 3.0.16273.0
cisco webex_teams 3.0.16285.0
cisco webex_teams 4.0
cisco webex_teams 4.1
cisco webex_teams 4.1.57
cisco webex_teams 4.1.92
cisco webex_teams 4.2
cisco webex_teams 4.2.42
cisco webex_teams 4.2.75
cisco webex_teams 4.3
cisco webex_teams 4.4
cisco webex_teams 4.5
cisco webex_teams 4.5.224
cisco webex_teams 4.6
cisco webex_teams 4.6.197
cisco webex_teams 4.7.78
cisco webex_teams 4.8
cisco webex_teams 4.8.170
cisco webex_teams 4.9
cisco webex_teams 4.9.205
cisco webex_teams 4.9.252
cisco webex_teams 4.9.269
cisco webex_teams 4.10
cisco webex_teams 4.10.343
cisco webex_teams 4.11.211
cisco webex_teams 4.12
cisco webex_teams 4.12.236
cisco webex_teams 4.13
cisco webex_teams 4.13.200
cisco webex_teams 4.14
cisco webex_teams 4.15
cisco webex_teams 4.16
cisco webex_teams 4.17
cisco webex_teams 4.18
cisco webex_teams 4.19
cisco webex_teams 4.20
cisco webex_teams 42.1.0.169
cisco webex_teams 42.1.0.2219
cisco webex_teams 42.1.0.21190
cisco webex_teams 42.2
cisco webex_teams 42.2.0.21338
cisco webex_teams 42.2.0.21486
cisco webex_teams 42.3
cisco webex_teams 42.3.0.21576
cisco webex_teams 42.4.1.22032
cisco webex_teams 42.5.0.22259
cisco webex_teams 42.6
cisco webex_teams 42.6.0.22565
cisco webex_teams 42.6.0.22645
cisco webex_teams 42.7
cisco webex_teams 42.7.0.22904
cisco webex_teams 42.7.0.23054
cisco webex_teams 42.8
cisco webex_teams 42.8.0.23214
cisco webex_teams 42.8.0.23281
cisco webex_teams 42.9
cisco webex_teams 42.9.0.23494
cisco webex_teams 42.10
cisco webex_teams 42.10.0.23814
cisco webex_teams 42.10.0.24000
cisco webex_teams 42.11
cisco webex_teams 42.11.0.24187
cisco webex_teams 42.12
cisco webex_teams 42.12.0.24485
cisco webex_teams 43.1
cisco webex_teams 43.1.0.24716
cisco webex_teams 43.2
cisco webex_teams 43.2.0.25157
cisco webex_teams 43.2.0.25211
cisco webex_teams 43.3
cisco webex_teams 43.3.0.25468
cisco webex_teams 43.4
cisco webex_teams 43.4.0.25788

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.13464.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "A0731376-1EF1-4361-89D9-6B2C0B64370E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.13538.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "8289243E-6CEC-43EC-B65C-9EA5E909D951",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.13588.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "F25EF33F-1164-4A67-B60B-EB6467DE9D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14154.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "C66338FC-7D39-459A-A42B-E26E9181C436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14234.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "8C1AAA94-BE6C-4092-8770-F2F646B79E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14375.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FA788BAC-1DC0-42E4-BA10-2A89934E84F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14741.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "A6DDBEE5-D11F-4BFF-9A5C-028407FBAA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.14866.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "4499D4FB-FC7C-4974-8343-57B2CAE63136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15015.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "E7CA0AAA-E188-4750-81B1-39B191551FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15036.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "90657271-CDE4-4BCE-9382-0CF7A93B97D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15092.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "9E2928B4-6CA9-4CB4-9AAB-036974746EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15131.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "5134AE77-8890-422F-8328-0676FB4D863C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15164.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "B72A2ADC-98EE-4EE2-8EDD-8D24432526AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15221.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FB34AF13-AACA-450A-B55B-91D87AE36453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15333.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "50B3FEE3-C3F2-4134-931F-CAD806F87156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15410.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "4E2C3B35-124E-45B7-9EBC-EF1507CAAEC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15485.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "6483C20E-E95D-443E-9C0E-8FFA0A54292D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15645.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "AA1D8B71-94F1-438B-98FD-2F7A17CF7663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15711.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FC5DC5E2-4FAB-4C7C-915F-0310A85A90B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16040.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "33A4716E-0A8E-450C-8A23-99EC4818CA8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16269.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "FFD800A7-5E0A-463D-95F8-543DBECCCB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16273.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "57EBA9CF-6588-40D1-BF98-A3189E0BD8AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.16285.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "44405865-5EE6-4AFE-BE55-ED149A614C1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.0:*:*:*:*:-:*:*",
              "matchCriteriaId": "884A4E78-54EE-49F1-B414-D67498B61015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.1:*:*:*:*:-:*:*",
              "matchCriteriaId": "541722A6-CA34-4999-891C-9245F9958F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.1.57:*:*:*:*:-:*:*",
              "matchCriteriaId": "607A5868-98E7-4693-9E86-EBD48764A06C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.1.92:*:*:*:*:-:*:*",
              "matchCriteriaId": "6538CBC9-0BFA-4DB3-A754-3B770E3230CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.2:*:*:*:*:-:*:*",
              "matchCriteriaId": "F6030AFD-E170-42E2-9C13-588AA08BE560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.2.42:*:*:*:*:-:*:*",
              "matchCriteriaId": "DDCAF3B6-251B-4468-9A84-8E7204EFE065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.2.75:*:*:*:*:-:*:*",
              "matchCriteriaId": "0547F801-29FE-4AB5-AA6B-478920062928",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.3:*:*:*:*:-:*:*",
              "matchCriteriaId": "4753283B-14DA-42A8-8577-084067645E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.4:*:*:*:*:-:*:*",
              "matchCriteriaId": "D1E4DAE5-03B4-409F-B1F0-D325F7743063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.5:*:*:*:*:-:*:*",
              "matchCriteriaId": "BB84CCC7-0BA0-4FDE-A8B9-0C83967D1769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.5.224:*:*:*:*:-:*:*",
              "matchCriteriaId": "4027766A-85CF-4BF7-9FEA-04DED535DBD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.6:*:*:*:*:-:*:*",
              "matchCriteriaId": "7F114421-1DA7-47F6-A3B1-9B739B3B78ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.6.197:*:*:*:*:-:*:*",
              "matchCriteriaId": "CEA1CE45-C406-45DD-AEEE-5E5FE4C52091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.7.78:*:*:*:*:-:*:*",
              "matchCriteriaId": "1F5891B7-C9FA-4BF6-BC5D-D2CFC8A28CE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.8:*:*:*:*:-:*:*",
              "matchCriteriaId": "831FC631-4D0D-424A-A743-E0EF2240853D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.8.170:*:*:*:*:-:*:*",
              "matchCriteriaId": "CB1D62ED-0FB0-423B-AB3A-ECBBCE1D750E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.9:*:*:*:*:-:*:*",
              "matchCriteriaId": "451837E9-1C00-4AEE-9CBA-0BCD62F10EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.9.205:*:*:*:*:-:*:*",
              "matchCriteriaId": "89E775E8-CF8E-412E-91FB-FE4FBE4E8875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.9.252:*:*:*:*:-:*:*",
              "matchCriteriaId": "DF746917-7BD5-4111-86FA-E3A7C66B7D77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.9.269:*:*:*:*:-:*:*",
              "matchCriteriaId": "FD2EFE51-A37B-431B-BB7D-F61F42F66513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.10:*:*:*:*:-:*:*",
              "matchCriteriaId": "82F843BE-035F-41DE-B875-96412D40E633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.10.343:*:*:*:*:-:*:*",
              "matchCriteriaId": "34AEDBA9-436A-4FFF-B32E-4D8EEE07E1E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.11.211:*:*:*:*:-:*:*",
              "matchCriteriaId": "17C5AF29-BCDB-47F5-A33A-121D8709D1DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.12:*:*:*:*:-:*:*",
              "matchCriteriaId": "C0F8C917-86F7-41B4-8952-EE60F39705FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.12.236:*:*:*:*:-:*:*",
              "matchCriteriaId": "B87F5E8E-0B62-4F44-968C-848C8844911C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.13:*:*:*:*:-:*:*",
              "matchCriteriaId": "4F9169C8-D677-4550-BB1D-661BCE66A6E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.13.200:*:*:*:*:-:*:*",
              "matchCriteriaId": "5751F200-C070-4F38-9A49-CD0C81890663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.14:*:*:*:*:-:*:*",
              "matchCriteriaId": "C9E2FE4F-2A69-4516-A507-5E0804186D40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.15:*:*:*:*:-:*:*",
              "matchCriteriaId": "8FA482C9-BEA4-4CB3-9FA0-7F49F9994817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.16:*:*:*:*:-:*:*",
              "matchCriteriaId": "D43460DB-12F9-44CA-8F2B-043C0BA90462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.17:*:*:*:*:-:*:*",
              "matchCriteriaId": "F52C9271-5B79-4AA2-B0BD-1920A746C874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.18:*:*:*:*:-:*:*",
              "matchCriteriaId": "BDE335B1-47B3-4B6A-9348-4C09F638F6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.19:*:*:*:*:-:*:*",
              "matchCriteriaId": "0FD7D1F8-DAC9-4A82-ADCF-1B28B036A097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:4.20:*:*:*:*:-:*:*",
              "matchCriteriaId": "2B28E8FB-339C-47BE-A0ED-F499C50F0F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.1.0.169:*:*:*:*:-:*:*",
              "matchCriteriaId": "7C8BB483-0BB1-4415-8DE3-0817AD0F05C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.1.0.2219:*:*:*:*:-:*:*",
              "matchCriteriaId": "08FA3F4E-1DD9-40CA-82FB-42B3451CB50E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.1.0.21190:*:*:*:*:-:*:*",
              "matchCriteriaId": "BDC16500-BE29-4F48-B10F-CF1A5E5170BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.2:*:*:*:*:-:*:*",
              "matchCriteriaId": "8482BEDC-AA74-4DA4-919E-0A4F57551F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.2.0.21338:*:*:*:*:-:*:*",
              "matchCriteriaId": "DC462FE6-D300-4A60-9A39-366420CA2930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.2.0.21486:*:*:*:*:-:*:*",
              "matchCriteriaId": "A3C5E73E-6AFE-4A40-920A-7C511477AAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.3:*:*:*:*:-:*:*",
              "matchCriteriaId": "27A08866-6C64-41CF-A228-F838CF3A0370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.3.0.21576:*:*:*:*:-:*:*",
              "matchCriteriaId": "8671E430-9610-475B-A42B-23D9B389531F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.4.1.22032:*:*:*:*:-:*:*",
              "matchCriteriaId": "B6C446D7-7700-448A-B9CE-99F8E4E5D119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.5.0.22259:*:*:*:*:-:*:*",
              "matchCriteriaId": "6A5BBD96-10D5-4E7D-92D5-924C87146450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.6:*:*:*:*:-:*:*",
              "matchCriteriaId": "7494FC8F-E36D-49D3-8BCB-F51C14B125CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.6.0.22565:*:*:*:*:-:*:*",
              "matchCriteriaId": "0933FFB3-20B9-4911-868B-27A6ACBE1E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.6.0.22645:*:*:*:*:-:*:*",
              "matchCriteriaId": "9BFA48AE-1685-407B-8917-7F277657D3D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.7:*:*:*:*:-:*:*",
              "matchCriteriaId": "501BAD21-7B5E-4E7D-8CC7-86828124AF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.7.0.22904:*:*:*:*:-:*:*",
              "matchCriteriaId": "61DAC3AC-AE37-43C3-B65C-CC513E90E069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.7.0.23054:*:*:*:*:-:*:*",
              "matchCriteriaId": "DC18AF9B-AC2F-4183-8021-BF08026FA33B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.8:*:*:*:*:-:*:*",
              "matchCriteriaId": "EF1964F5-CCEC-4D0C-94D1-3F83726CB5A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.8.0.23214:*:*:*:*:-:*:*",
              "matchCriteriaId": "798FCD25-77F4-4625-91D5-E1BBE353B7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.8.0.23281:*:*:*:*:-:*:*",
              "matchCriteriaId": "CF286711-7D09-4125-BDCE-6FCC520A54B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.9:*:*:*:*:-:*:*",
              "matchCriteriaId": "01ED5949-173F-42A6-A0B0-67C47125F966",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.9.0.23494:*:*:*:*:-:*:*",
              "matchCriteriaId": "1EB7D461-BFF7-4D4A-A6B4-BCF290379076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.10:*:*:*:*:-:*:*",
              "matchCriteriaId": "2C29410E-7B91-40DC-8AD2-C30A9162E822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.10.0.23814:*:*:*:*:-:*:*",
              "matchCriteriaId": "E4B6854B-7843-4FBF-81AA-ABA6145F8458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.10.0.24000:*:*:*:*:-:*:*",
              "matchCriteriaId": "16D9C9E7-98B3-4A6A-AC48-F8E7C18CA1FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.11:*:*:*:*:-:*:*",
              "matchCriteriaId": "573337DC-A95D-4720-9637-3BE590410FCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.11.0.24187:*:*:*:*:-:*:*",
              "matchCriteriaId": "1C54D0AC-F9EC-4FA7-9BA6-6DBDC3743C64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.12:*:*:*:*:-:*:*",
              "matchCriteriaId": "CF2E05E2-B6B6-419D-BE2F-BFB743EFB619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:42.12.0.24485:*:*:*:*:-:*:*",
              "matchCriteriaId": "5FB14348-E1EE-43E6-A66E-23B78E805DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.1:*:*:*:*:-:*:*",
              "matchCriteriaId": "97A7514D-3BEF-4895-B313-E38D0EA4ABCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.1.0.24716:*:*:*:*:-:*:*",
              "matchCriteriaId": "F0AA0F07-C8DF-4AC1-8799-0D2612FA65E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.2:*:*:*:*:-:*:*",
              "matchCriteriaId": "0BF47256-96E9-46C3-BCA0-80A0A0077AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.2.0.25157:*:*:*:*:-:*:*",
              "matchCriteriaId": "EAC1AE74-F875-4161-95A3-102E5AC35015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.2.0.25211:*:*:*:*:-:*:*",
              "matchCriteriaId": "60571D58-E948-4F17-9A9B-7F853D85C995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.3:*:*:*:*:-:*:*",
              "matchCriteriaId": "4B33A187-3E22-4A56-8E3D-6AB7218099A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.3.0.25468:*:*:*:*:-:*:*",
              "matchCriteriaId": "5356285B-A3C2-45D2-BE88-41B3F27DD294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.4:*:*:*:*:-:*:*",
              "matchCriteriaId": "19D33A9F-0EF2-4CB2-B085-AFB46DBBE4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:43.4.0.25788:*:*:*:*:-:*:*",
              "matchCriteriaId": "ED47DCB3-FABB-4AAE-A565-09A13693E5F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information.\r\n\r This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la funcionalidad de recuperaci\u00f3n de medios de la aplicaci\u00f3n Cisco Webex podr\u00eda permitir que un atacante adyacente no autenticado obtenga acceso a informaci\u00f3n confidencial de la sesi\u00f3n. Esta vulnerabilidad se debe a la transmisi\u00f3n insegura de solicitudes a servicios de backend cuando la aplicaci\u00f3n accede a medios integrados, como im\u00e1genes. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un mensaje con medios integrados almacenados en un servidor de mensajer\u00eda a un usuario objetivo. Si el atacante puede observar el tr\u00e1fico transmitido en una posici\u00f3n privilegiada de la red, una explotaci\u00f3n exitosa podr\u00eda permitirle capturar informaci\u00f3n del token de sesi\u00f3n de solicitudes transmitidas de manera insegura y posiblemente reutilizar la informaci\u00f3n de la sesi\u00f3n capturada para tomar acciones adicionales como el usuario objetivo."
    }
  ],
  "id": "CVE-2024-20395",
  "lastModified": "2025-07-31T16:04:57.460",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-17T17:15:12.833",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-523"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2023-20104

Vulnerability from fkie_nvd - Published: 2023-03-03 16:15 - Updated: 2024-11-21 07:40
Summary
A vulnerability in the file upload functionality of Cisco Webex App for Web could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending an arbitrary file to a user and persuading that user to browse to a specific URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impacted products
Vendor Product Version
cisco webex_teams -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8185FE3-9268-4784-8F4E-8079A920D87B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the file upload functionality of Cisco Webex App for Web could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending an arbitrary file to a user and persuading that user to browse to a specific URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
    }
  ],
  "id": "CVE-2023-20104",
  "lastModified": "2024-11-21T07:40:33.527",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-03T16:15:10.523",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-20863

Vulnerability from fkie_nvd - Published: 2022-09-08 13:15 - Updated: 2024-11-21 06:43
Summary
A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks.
Impacted products
Vendor Product Version
cisco webex_teams *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A333C399-691C-45CF-B8C1-B1E9C3DED212",
              "versionEndExcluding": "42.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de mensajer\u00eda de la aplicaci\u00f3n Cisco Webex, anteriormente Webex Teams, podr\u00eda permitir a un atacante remoto no autenticado manipular enlaces u otro contenido dentro de la interfaz de mensajer\u00eda.\u0026#xa0;Esta vulnerabilidad se presenta porque el software afectado no maneja apropiadamente la representaci\u00f3n de caracteres.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de mensajes dentro de la interfaz de la aplicaci\u00f3n.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante modificar la visualizaci\u00f3n de enlaces u otro contenido dentro de la interfaz, lo que podr\u00eda permitirle conducir ataques de phishing o suplantaci\u00f3n de identidad"
    }
  ],
  "id": "CVE-2022-20863",
  "lastModified": "2024-11-21T06:43:42.510",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-08T13:15:08.930",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-450"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-1536

Vulnerability from fkie_nvd - Published: 2021-06-04 17:15 - Updated: 2024-11-21 05:44
Summary
A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_meetings_desktop:-:*:*:*:*:windows:*:*",
              "matchCriteriaId": "B13F932E-8877-44C0-8EDC-C75F14C2809B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_meetings_online:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B47441-8048-4544-86A8-611DA68398A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12AF70E-2201-4F5D-A929-A1A057B74252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_network_recording_player:-:*:*:*:*:windows:*:*",
              "matchCriteriaId": "A34EE1A3-F564-4B28-A252-1E0AD53B2B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15485.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F367BA7A-1DA0-4E31-BFB5-CC988E7DF3CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en Cisco Webex Meetings Desktop App para Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player para Windows y Cisco Webex Teams para Windows, podr\u00eda permitir a un atacante local autenticado llevar a cabo un ataque de inyecci\u00f3n de DLL en un dispositivo afectado. Para explotar esta vulnerabilidad, el atacante debe tener credenciales v\u00e1lidas en el sistema Windows. Esta vulnerabilidad es debido a un manejo incorrecto de las rutas de directorio en tiempo de ejecuci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad al insertar un archivo de configuraci\u00f3n en una ruta espec\u00edfica del sistema, lo que puede causar que se cargue un archivo DLL malicioso cuando se inicie la aplicaci\u00f3n. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema afectado con los privilegios de otra cuenta de usuario"
    }
  ],
  "id": "CVE-2021-1536",
  "lastModified": "2024-11-21T05:44:34.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-04T17:15:09.150",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-1502

Vulnerability from fkie_nvd - Published: 2021-06-04 17:15 - Updated: 2024-11-21 05:44
Summary
A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_meetings_desktop:-:*:*:*:*:windows:*:*",
              "matchCriteriaId": "B13F932E-8877-44C0-8EDC-C75F14C2809B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_meetings_online:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B47441-8048-4544-86A8-611DA68398A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12AF70E-2201-4F5D-A929-A1A057B74252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_network_recording_player:-:*:*:*:*:windows:*:*",
              "matchCriteriaId": "A34EE1A3-F564-4B28-A252-1E0AD53B2B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:3.0.15485.0:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F367BA7A-1DA0-4E31-BFB5-CC988E7DF3CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_network_recording_player:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "B7968B3F-2DF6-45E2-B2C6-5600A972B125",
              "versionEndExcluding": "41.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webex_network_recording_player:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "19E8714E-7F29-416F-B9D0-9CCE8935BE40",
              "versionEndExcluding": "41.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en Cisco Webex Network Recording Player para Windows y MacOS y Cisco Webex Player para Windows y MacOS podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario en un sistema afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de valores dentro de los archivos de grabaci\u00f3n de Webex formateados tanto en Advanced Recording Format (ARF) como en Webex Recording Format (WRF). Un atacante podr\u00eda explotar la vulnerabilidad mediante el env\u00edo a un usuario un archivo ARF o WRF malicioso mediante un enlace o un archivo adjunto de correo electr\u00f3nico y persuadiendo al usuario para que abra el archivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema afectado con los privilegios del usuario objetivo"
    }
  ],
  "id": "CVE-2021-1502",
  "lastModified": "2024-11-21T05:44:29.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-04T17:15:08.097",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-1242

Vulnerability from fkie_nvd - Published: 2021-01-13 22:15 - Updated: 2024-11-21 05:43
Summary
A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.
Impacted products
Vendor Product Version
cisco webex_teams *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "845BE1B4-1D05-491B-8EA9-E3A5028C6535",
              "versionEndExcluding": "40.12.0.17293",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en Cisco Webex Teams, podr\u00eda permitir a un atacante remoto no autenticado manipular nombres de archivos dentro de la interfaz de mensajer\u00eda.\u0026#xa0;La vulnerabilidad se presenta porque el software afectado maneja inapropiadamente la representaci\u00f3n de caracteres.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad compartiendo un archivo dentro de la interfaz de la aplicaci\u00f3n.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitirle al atacante modificar c\u00f3mo se muestra el nombre del archivo compartido dentro de la interfaz, lo que podr\u00eda permitir al atacante realizar ataques de phishing o suplantaci\u00f3n de identidad."
    }
  ],
  "id": "CVE-2021-1242",
  "lastModified": "2024-11-21T05:43:54.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-01-13T22:15:20.990",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-450"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-3535

Vulnerability from fkie_nvd - Published: 2020-10-08 05:15 - Updated: 2024-11-21 05:31
Summary
A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account.
Impacted products
Vendor Product Version
cisco webex_teams *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:webex_teams:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F4B0C4AC-EA1C-45D7-B878-7DFA4CF62AF2",
              "versionEndIncluding": "3.0.16040.0",
              "versionStartIncluding": "3.0.13464.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user\u0026rsquo;s account."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el mecanismo de carga de archivos DLL espec\u00edficos en el cliente Cisco Webex Teams para Windows, podr\u00eda permitir a un atacante local autenticado cargar una biblioteca maliciosa.\u0026#xa0;Para explotar esta vulnerabilidad, el atacante necesita credenciales v\u00e1lidas en el sistema Windows.\u0026#xa0;La vulnerabilidad es debido al manejo incorrecto de las rutas de directorio en tiempo de ejecuci\u00f3n.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante la colocaci\u00f3n un archivo DLL malicioso en una ubicaci\u00f3n espec\u00edfica del sistema de destino.\u0026#xa0;Este archivo se ejecutar\u00e1 cuando se inicie la aplicaci\u00f3n vulnerable.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema objetivo con los privilegios de otra cuenta user\u2019s"
    }
  ],
  "id": "CVE-2020-3535",
  "lastModified": "2024-11-21T05:31:16.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-08T05:15:14.773",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2025-20236 (GCVE-0-2025-20236)

Vulnerability from cvelistv5 – Published: 2025-04-16 16:16 – Updated: 2025-04-17 03:55
VLAI?
Summary
A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.
CWE
  • CWE-829 - Inclusion of Functionality from Untrusted Control Sphere
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Webex Teams Affected: 44.6
Affected: 44.6.0.29928
Affected: 44.6.0.30148
Affected: 44.7
Affected: 44.7.0.30141
Affected: 44.7.0.30285
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20236",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T03:55:22.841Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "44.6"
            },
            {
              "status": "affected",
              "version": "44.6.0.29928"
            },
            {
              "status": "affected",
              "version": "44.6.0.30148"
            },
            {
              "status": "affected",
              "version": "44.7"
            },
            {
              "status": "affected",
              "version": "44.7.0.30141"
            },
            {
              "status": "affected",
              "version": "44.7.0.30285"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.\r\n\r\nThis vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-829",
              "description": "Inclusion of Functionality from Untrusted Control Sphere",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-16T17:45:31.016Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-app-client-rce-ufyMMYLC",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-client-rce-ufyMMYLC",
        "defects": [
          "CSCwn07296"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex App Client-Side Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20236",
    "datePublished": "2025-04-16T16:16:23.291Z",
    "dateReserved": "2024-10-10T19:15:13.237Z",
    "dateUpdated": "2025-04-17T03:55:22.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-26067 (GCVE-0-2020-26067)

Vulnerability from cvelistv5 – Published: 2024-11-18 16:10 – Updated: 2024-11-26 14:41
VLAI?
Summary
A vulnerability in the web-based interface of Cisco Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-26067",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T17:21:04.083089Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T14:41:03.582Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based interface of Cisco\u0026nbsp;Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks.\r\nThe vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/RL:X/RC:X/E:X",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-18T16:10:34.462Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-teams-xss-zLW9tD3",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-teams-xss-zLW9tD3",
        "defects": [
          "CSCvv40214"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Webex Teams Web Interface Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-26067",
    "datePublished": "2024-11-18T16:10:24.951Z",
    "dateReserved": "2020-09-24T00:00:00.000Z",
    "dateUpdated": "2024-11-26T14:41:03.582Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20396 (GCVE-0-2024-20396)

Vulnerability from cvelistv5 – Published: 2024-07-17 16:33 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Webex Teams Affected: 3.0.13464.0
Affected: 3.0.13538.0
Affected: 3.0.13588.0
Affected: 3.0.14154.0
Affected: 3.0.14234.0
Affected: 3.0.14375.0
Affected: 3.0.14741.0
Affected: 3.0.14866.0
Affected: 3.0.15015.0
Affected: 3.0.15036.0
Affected: 3.0.15092.0
Affected: 3.0.15131.0
Affected: 3.0.15164.0
Affected: 3.0.15221.0
Affected: 3.0.15333.0
Affected: 3.0.15410.0
Affected: 3.0.15485.0
Affected: 3.0.15645.0
Affected: 3.0.15711.0
Affected: 3.0.16040.0
Affected: 3.0.16269.0
Affected: 3.0.16273.0
Affected: 3.0.16285.0
Affected: 42.1.0.21190
Affected: 42.10.0.23814
Affected: 42.11.0.24187
Affected: 42.12.0.24485
Affected: 42.2.0.21338
Affected: 42.2.0.21486
Affected: 42.3.0.21576
Affected: 42.4.1.22032
Affected: 42.5.0.22259
Affected: 42.6.0.22565
Affected: 42.6.0.22645
Affected: 42.7.0.22904
Affected: 42.7.0.23054
Affected: 42.8.0.23214
Affected: 42.8.0.23281
Affected: 42.9.0.23494
Affected: 43.1.0.24716
Affected: 43.2.0.25157
Affected: 43.2.0.25211
Affected: 43.3.0.25468
Affected: 43.4.0.25788
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20396",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-17T17:59:58.773024Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-17T18:00:53.060Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.785Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-webex-app-ZjNm8X8j",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0.13464.0"
            },
            {
              "status": "affected",
              "version": "3.0.13538.0"
            },
            {
              "status": "affected",
              "version": "3.0.13588.0"
            },
            {
              "status": "affected",
              "version": "3.0.14154.0"
            },
            {
              "status": "affected",
              "version": "3.0.14234.0"
            },
            {
              "status": "affected",
              "version": "3.0.14375.0"
            },
            {
              "status": "affected",
              "version": "3.0.14741.0"
            },
            {
              "status": "affected",
              "version": "3.0.14866.0"
            },
            {
              "status": "affected",
              "version": "3.0.15015.0"
            },
            {
              "status": "affected",
              "version": "3.0.15036.0"
            },
            {
              "status": "affected",
              "version": "3.0.15092.0"
            },
            {
              "status": "affected",
              "version": "3.0.15131.0"
            },
            {
              "status": "affected",
              "version": "3.0.15164.0"
            },
            {
              "status": "affected",
              "version": "3.0.15221.0"
            },
            {
              "status": "affected",
              "version": "3.0.15333.0"
            },
            {
              "status": "affected",
              "version": "3.0.15410.0"
            },
            {
              "status": "affected",
              "version": "3.0.15485.0"
            },
            {
              "status": "affected",
              "version": "3.0.15645.0"
            },
            {
              "status": "affected",
              "version": "3.0.15711.0"
            },
            {
              "status": "affected",
              "version": "3.0.16040.0"
            },
            {
              "status": "affected",
              "version": "3.0.16269.0"
            },
            {
              "status": "affected",
              "version": "3.0.16273.0"
            },
            {
              "status": "affected",
              "version": "3.0.16285.0"
            },
            {
              "status": "affected",
              "version": "42.1.0.21190"
            },
            {
              "status": "affected",
              "version": "42.10.0.23814"
            },
            {
              "status": "affected",
              "version": "42.11.0.24187"
            },
            {
              "status": "affected",
              "version": "42.12.0.24485"
            },
            {
              "status": "affected",
              "version": "42.2.0.21338"
            },
            {
              "status": "affected",
              "version": "42.2.0.21486"
            },
            {
              "status": "affected",
              "version": "42.3.0.21576"
            },
            {
              "status": "affected",
              "version": "42.4.1.22032"
            },
            {
              "status": "affected",
              "version": "42.5.0.22259"
            },
            {
              "status": "affected",
              "version": "42.6.0.22565"
            },
            {
              "status": "affected",
              "version": "42.6.0.22645"
            },
            {
              "status": "affected",
              "version": "42.7.0.22904"
            },
            {
              "status": "affected",
              "version": "42.7.0.23054"
            },
            {
              "status": "affected",
              "version": "42.8.0.23214"
            },
            {
              "status": "affected",
              "version": "42.8.0.23281"
            },
            {
              "status": "affected",
              "version": "42.9.0.23494"
            },
            {
              "status": "affected",
              "version": "43.1.0.24716"
            },
            {
              "status": "affected",
              "version": "43.2.0.25157"
            },
            {
              "status": "affected",
              "version": "43.2.0.25211"
            },
            {
              "status": "affected",
              "version": "43.3.0.25468"
            },
            {
              "status": "affected",
              "version": "43.4.0.25788"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\n\r This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-17T16:33:55.108Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-app-ZjNm8X8j",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-ZjNm8X8j",
        "defects": [
          "CSCwj36947"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20396",
    "datePublished": "2024-07-17T16:33:55.108Z",
    "dateReserved": "2023-11-08T15:08:07.660Z",
    "dateUpdated": "2024-08-01T21:59:41.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20395 (GCVE-0-2024-20395)

Vulnerability from cvelistv5 – Published: 2024-07-17 16:32 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information. This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user.
CWE
  • CWE-523 - Unprotected Transport of Credentials
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Webex Teams Affected: 3.0.13464.0
Affected: 3.0.13538.0
Affected: 3.0.13588.0
Affected: 3.0.14154.0
Affected: 3.0.14234.0
Affected: 3.0.14375.0
Affected: 3.0.14741.0
Affected: 3.0.14866.0
Affected: 3.0.15015.0
Affected: 3.0.15036.0
Affected: 3.0.15092.0
Affected: 3.0.15131.0
Affected: 3.0.15164.0
Affected: 3.0.15221.0
Affected: 3.0.15333.0
Affected: 3.0.15410.0
Affected: 3.0.15485.0
Affected: 3.0.15645.0
Affected: 3.0.15711.0
Affected: 3.0.16040.0
Affected: 3.0.16269.0
Affected: 3.0.16273.0
Affected: 3.0.16285.0
Affected: 4.0
Affected: 4.1
Affected: 4.10
Affected: 4.12
Affected: 4.13
Affected: 4.14
Affected: 4.15
Affected: 4.16
Affected: 4.17
Affected: 4.18
Affected: 4.19
Affected: 4.2
Affected: 4.20
Affected: 4.3
Affected: 4.4
Affected: 4.5
Affected: 4.6
Affected: 4.8
Affected: 4.9
Affected: 4.1.57
Affected: 4.1.92
Affected: 4.10.343
Affected: 4.11.211
Affected: 4.12.236
Affected: 4.13.200
Affected: 4.2.42
Affected: 4.2.75
Affected: 4.5.224
Affected: 4.6.197
Affected: 4.7.78
Affected: 4.8.170
Affected: 4.9.205
Affected: 4.9.252
Affected: 4.9.269
Affected: 42.1.0.169
Affected: 42.1.0.21190
Affected: 42.1.0.2219
Affected: 42.10
Affected: 42.10.0.23814
Affected: 42.10.0.24000
Affected: 42.11
Affected: 42.11.0.24187
Affected: 42.12
Affected: 42.12.0.24485
Affected: 42.2
Affected: 42.2.0.21338
Affected: 42.2.0.21486
Affected: 42.3
Affected: 42.3.0.21576
Affected: 42.4.1.22032
Affected: 42.5.0.22259
Affected: 42.6
Affected: 42.6.0.22565
Affected: 42.6.0.22645
Affected: 42.7
Affected: 42.7.0.22904
Affected: 42.7.0.23054
Affected: 42.8
Affected: 42.8.0.23214
Affected: 42.8.0.23281
Affected: 42.9
Affected: 42.9.0.23494
Affected: 43.1
Affected: 43.1.0.24716
Affected: 43.2
Affected: 43.2.0.25157
Affected: 43.2.0.25211
Affected: 43.3
Affected: 43.3.0.25468
Affected: 43.4
Affected: 43.4.0.25788
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:webex_teams:3.0.13464.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.13538.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.13588.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14154.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14234.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14375.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14741.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14866.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15015.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15036.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15092.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15131.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15164.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15221.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15333.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15410.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15485.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15645.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15711.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16040.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16269.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16273.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16285.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.12:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.13:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.14:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.15:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.16:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.17:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.18:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.19:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.20:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.8:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.1.57:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.1.92:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.10.343:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.11.211:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.12.236:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.13.200:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.2.42:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.2.75:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.5.224:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.6.197:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.7.78:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.8.170:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9.205:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9.252:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9.269:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.1.0.169:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.1.0.21190:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.1.0.2219:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.10.0.23814:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.10.0.24000:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.11:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.11.0.24187:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.12:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.12.0.24485:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.2.0.21338:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.2.0.21486:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.3.0.21576:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.4.1.22032:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.5.0.22259:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.6.0.22565:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.6.0.22645:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.7:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.7.0.22904:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.7.0.23054:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.8:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.8.0.23214:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.8.0.23281:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.9:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.9.0.23494:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.1.0.24716:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.2.0.25157:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.2.0.25211:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.3.0.25468:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.4.0.25788:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "webex_teams",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "3.0.13464.0"
              },
              {
                "status": "affected",
                "version": "3.0.13538.0"
              },
              {
                "status": "affected",
                "version": "3.0.13588.0"
              },
              {
                "status": "affected",
                "version": "3.0.14154.0"
              },
              {
                "status": "affected",
                "version": "3.0.14234.0"
              },
              {
                "status": "affected",
                "version": "3.0.14375.0"
              },
              {
                "status": "affected",
                "version": "3.0.14741.0"
              },
              {
                "status": "affected",
                "version": "3.0.14866.0"
              },
              {
                "status": "affected",
                "version": "3.0.15015.0"
              },
              {
                "status": "affected",
                "version": "3.0.15036.0"
              },
              {
                "status": "affected",
                "version": "3.0.15092.0"
              },
              {
                "status": "affected",
                "version": "3.0.15131.0"
              },
              {
                "status": "affected",
                "version": "3.0.15164.0"
              },
              {
                "status": "affected",
                "version": "3.0.15221.0"
              },
              {
                "status": "affected",
                "version": "3.0.15333.0"
              },
              {
                "status": "affected",
                "version": "3.0.15410.0"
              },
              {
                "status": "affected",
                "version": "3.0.15485.0"
              },
              {
                "status": "affected",
                "version": "3.0.15645.0"
              },
              {
                "status": "affected",
                "version": "3.0.15711.0"
              },
              {
                "status": "affected",
                "version": "3.0.16040.0"
              },
              {
                "status": "affected",
                "version": "3.0.16269.0"
              },
              {
                "status": "affected",
                "version": "3.0.16273.0"
              },
              {
                "status": "affected",
                "version": "3.0.16285.0"
              },
              {
                "status": "affected",
                "version": "4.0"
              },
              {
                "status": "affected",
                "version": "4.1"
              },
              {
                "status": "affected",
                "version": "4.10"
              },
              {
                "status": "affected",
                "version": "4.12"
              },
              {
                "status": "affected",
                "version": "4.13"
              },
              {
                "status": "affected",
                "version": "4.14"
              },
              {
                "status": "affected",
                "version": "4.15"
              },
              {
                "status": "affected",
                "version": "4.16"
              },
              {
                "status": "affected",
                "version": "4.17"
              },
              {
                "status": "affected",
                "version": "4.18"
              },
              {
                "status": "affected",
                "version": "4.19"
              },
              {
                "status": "affected",
                "version": "4.2"
              },
              {
                "status": "affected",
                "version": "4.20"
              },
              {
                "status": "affected",
                "version": "4.3"
              },
              {
                "status": "affected",
                "version": "4.4"
              },
              {
                "status": "affected",
                "version": "4.5"
              },
              {
                "status": "affected",
                "version": "4.6"
              },
              {
                "status": "affected",
                "version": "4.8"
              },
              {
                "status": "affected",
                "version": "4.9"
              },
              {
                "status": "affected",
                "version": "4.1.57"
              },
              {
                "status": "affected",
                "version": "4.1.92"
              },
              {
                "status": "affected",
                "version": "4.10.343"
              },
              {
                "status": "affected",
                "version": "4.11.211"
              },
              {
                "status": "affected",
                "version": "4.12.236"
              },
              {
                "status": "affected",
                "version": "4.13.200"
              },
              {
                "status": "affected",
                "version": "4.2.42"
              },
              {
                "status": "affected",
                "version": "4.2.75"
              },
              {
                "status": "affected",
                "version": "4.5.224"
              },
              {
                "status": "affected",
                "version": "4.6.197"
              },
              {
                "status": "affected",
                "version": "4.7.78"
              },
              {
                "status": "affected",
                "version": "4.8.170"
              },
              {
                "status": "affected",
                "version": "4.9.205"
              },
              {
                "status": "affected",
                "version": "4.9.252"
              },
              {
                "status": "affected",
                "version": "4.9.269"
              },
              {
                "status": "affected",
                "version": "42.1.0.169"
              },
              {
                "status": "affected",
                "version": "42.1.0.21190"
              },
              {
                "status": "affected",
                "version": "42.1.0.2219"
              },
              {
                "status": "affected",
                "version": "42.10"
              },
              {
                "status": "affected",
                "version": "42.10.0.23814"
              },
              {
                "status": "affected",
                "version": "42.10.0.24000"
              },
              {
                "status": "affected",
                "version": "42.11"
              },
              {
                "status": "affected",
                "version": "42.11.0.24187"
              },
              {
                "status": "affected",
                "version": "42.12"
              },
              {
                "status": "affected",
                "version": "42.12.0.24485"
              },
              {
                "status": "affected",
                "version": "42.2"
              },
              {
                "status": "affected",
                "version": "42.2.0.21338"
              },
              {
                "status": "affected",
                "version": "42.2.0.21486"
              },
              {
                "status": "affected",
                "version": "42.3"
              },
              {
                "status": "affected",
                "version": "42.3.0.21576"
              },
              {
                "status": "affected",
                "version": "42.4.1.22032"
              },
              {
                "status": "affected",
                "version": "42.5.0.22259"
              },
              {
                "status": "affected",
                "version": "42.6"
              },
              {
                "status": "affected",
                "version": "42.6.0.22565"
              },
              {
                "status": "affected",
                "version": "42.6.0.22645"
              },
              {
                "status": "affected",
                "version": "42.7"
              },
              {
                "status": "affected",
                "version": "42.7.0.22904"
              },
              {
                "status": "affected",
                "version": "42.7.0.23054"
              },
              {
                "status": "affected",
                "version": "42.8"
              },
              {
                "status": "affected",
                "version": "42.8.0.23214"
              },
              {
                "status": "affected",
                "version": "42.8.0.23281"
              },
              {
                "status": "affected",
                "version": "42.9"
              },
              {
                "status": "affected",
                "version": "42.9.0.23494"
              },
              {
                "status": "affected",
                "version": "43.1"
              },
              {
                "status": "affected",
                "version": "43.1.0.24716"
              },
              {
                "status": "affected",
                "version": "43.2"
              },
              {
                "status": "affected",
                "version": "43.2.0.25157"
              },
              {
                "status": "affected",
                "version": "43.2.0.25211"
              },
              {
                "status": "affected",
                "version": "43.3"
              },
              {
                "status": "affected",
                "version": "43.3.0.25468"
              },
              {
                "status": "affected",
                "version": "43.4"
              },
              {
                "status": "affected",
                "version": "43.4.0.25788"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20395",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-18T03:55:23.962265Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-18T13:23:45.549Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-webex-app-ZjNm8X8j",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0.13464.0"
            },
            {
              "status": "affected",
              "version": "3.0.13538.0"
            },
            {
              "status": "affected",
              "version": "3.0.13588.0"
            },
            {
              "status": "affected",
              "version": "3.0.14154.0"
            },
            {
              "status": "affected",
              "version": "3.0.14234.0"
            },
            {
              "status": "affected",
              "version": "3.0.14375.0"
            },
            {
              "status": "affected",
              "version": "3.0.14741.0"
            },
            {
              "status": "affected",
              "version": "3.0.14866.0"
            },
            {
              "status": "affected",
              "version": "3.0.15015.0"
            },
            {
              "status": "affected",
              "version": "3.0.15036.0"
            },
            {
              "status": "affected",
              "version": "3.0.15092.0"
            },
            {
              "status": "affected",
              "version": "3.0.15131.0"
            },
            {
              "status": "affected",
              "version": "3.0.15164.0"
            },
            {
              "status": "affected",
              "version": "3.0.15221.0"
            },
            {
              "status": "affected",
              "version": "3.0.15333.0"
            },
            {
              "status": "affected",
              "version": "3.0.15410.0"
            },
            {
              "status": "affected",
              "version": "3.0.15485.0"
            },
            {
              "status": "affected",
              "version": "3.0.15645.0"
            },
            {
              "status": "affected",
              "version": "3.0.15711.0"
            },
            {
              "status": "affected",
              "version": "3.0.16040.0"
            },
            {
              "status": "affected",
              "version": "3.0.16269.0"
            },
            {
              "status": "affected",
              "version": "3.0.16273.0"
            },
            {
              "status": "affected",
              "version": "3.0.16285.0"
            },
            {
              "status": "affected",
              "version": "4.0"
            },
            {
              "status": "affected",
              "version": "4.1"
            },
            {
              "status": "affected",
              "version": "4.10"
            },
            {
              "status": "affected",
              "version": "4.12"
            },
            {
              "status": "affected",
              "version": "4.13"
            },
            {
              "status": "affected",
              "version": "4.14"
            },
            {
              "status": "affected",
              "version": "4.15"
            },
            {
              "status": "affected",
              "version": "4.16"
            },
            {
              "status": "affected",
              "version": "4.17"
            },
            {
              "status": "affected",
              "version": "4.18"
            },
            {
              "status": "affected",
              "version": "4.19"
            },
            {
              "status": "affected",
              "version": "4.2"
            },
            {
              "status": "affected",
              "version": "4.20"
            },
            {
              "status": "affected",
              "version": "4.3"
            },
            {
              "status": "affected",
              "version": "4.4"
            },
            {
              "status": "affected",
              "version": "4.5"
            },
            {
              "status": "affected",
              "version": "4.6"
            },
            {
              "status": "affected",
              "version": "4.8"
            },
            {
              "status": "affected",
              "version": "4.9"
            },
            {
              "status": "affected",
              "version": "4.1.57"
            },
            {
              "status": "affected",
              "version": "4.1.92"
            },
            {
              "status": "affected",
              "version": "4.10.343"
            },
            {
              "status": "affected",
              "version": "4.11.211"
            },
            {
              "status": "affected",
              "version": "4.12.236"
            },
            {
              "status": "affected",
              "version": "4.13.200"
            },
            {
              "status": "affected",
              "version": "4.2.42"
            },
            {
              "status": "affected",
              "version": "4.2.75"
            },
            {
              "status": "affected",
              "version": "4.5.224"
            },
            {
              "status": "affected",
              "version": "4.6.197"
            },
            {
              "status": "affected",
              "version": "4.7.78"
            },
            {
              "status": "affected",
              "version": "4.8.170"
            },
            {
              "status": "affected",
              "version": "4.9.205"
            },
            {
              "status": "affected",
              "version": "4.9.252"
            },
            {
              "status": "affected",
              "version": "4.9.269"
            },
            {
              "status": "affected",
              "version": "42.1.0.169"
            },
            {
              "status": "affected",
              "version": "42.1.0.21190"
            },
            {
              "status": "affected",
              "version": "42.1.0.2219"
            },
            {
              "status": "affected",
              "version": "42.10"
            },
            {
              "status": "affected",
              "version": "42.10.0.23814"
            },
            {
              "status": "affected",
              "version": "42.10.0.24000"
            },
            {
              "status": "affected",
              "version": "42.11"
            },
            {
              "status": "affected",
              "version": "42.11.0.24187"
            },
            {
              "status": "affected",
              "version": "42.12"
            },
            {
              "status": "affected",
              "version": "42.12.0.24485"
            },
            {
              "status": "affected",
              "version": "42.2"
            },
            {
              "status": "affected",
              "version": "42.2.0.21338"
            },
            {
              "status": "affected",
              "version": "42.2.0.21486"
            },
            {
              "status": "affected",
              "version": "42.3"
            },
            {
              "status": "affected",
              "version": "42.3.0.21576"
            },
            {
              "status": "affected",
              "version": "42.4.1.22032"
            },
            {
              "status": "affected",
              "version": "42.5.0.22259"
            },
            {
              "status": "affected",
              "version": "42.6"
            },
            {
              "status": "affected",
              "version": "42.6.0.22565"
            },
            {
              "status": "affected",
              "version": "42.6.0.22645"
            },
            {
              "status": "affected",
              "version": "42.7"
            },
            {
              "status": "affected",
              "version": "42.7.0.22904"
            },
            {
              "status": "affected",
              "version": "42.7.0.23054"
            },
            {
              "status": "affected",
              "version": "42.8"
            },
            {
              "status": "affected",
              "version": "42.8.0.23214"
            },
            {
              "status": "affected",
              "version": "42.8.0.23281"
            },
            {
              "status": "affected",
              "version": "42.9"
            },
            {
              "status": "affected",
              "version": "42.9.0.23494"
            },
            {
              "status": "affected",
              "version": "43.1"
            },
            {
              "status": "affected",
              "version": "43.1.0.24716"
            },
            {
              "status": "affected",
              "version": "43.2"
            },
            {
              "status": "affected",
              "version": "43.2.0.25157"
            },
            {
              "status": "affected",
              "version": "43.2.0.25211"
            },
            {
              "status": "affected",
              "version": "43.3"
            },
            {
              "status": "affected",
              "version": "43.3.0.25468"
            },
            {
              "status": "affected",
              "version": "43.4"
            },
            {
              "status": "affected",
              "version": "43.4.0.25788"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information.\r\n\r This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-523",
              "description": "Unprotected Transport of Credentials",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-17T16:32:07.102Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-app-ZjNm8X8j",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-ZjNm8X8j",
        "defects": [
          "CSCwj36941",
          "CSCwj36943"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20395",
    "datePublished": "2024-07-17T16:32:07.102Z",
    "dateReserved": "2023-11-08T15:08:07.659Z",
    "dateUpdated": "2024-08-01T21:59:42.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20104 (GCVE-0-2023-20104)

Vulnerability from cvelistv5 – Published: 2023-03-03 00:00 – Updated: 2024-10-25 16:03
VLAI?
Summary
A vulnerability in the file upload functionality of Cisco Webex App for Web could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending an arbitrary file to a user and persuading that user to browse to a specific URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.598Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20230301 Cisco Webex App for Web Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20104",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-25T14:36:26.938361Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-25T16:03:19.632Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams ",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2023-03-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the file upload functionality of Cisco Webex App for Web could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending an arbitrary file to a user and persuading that user to browse to a specific URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-03T00:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20230301 Cisco Webex App for Web Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-xss-Yn8HHsMJ",
        "defect": [
          [
            "CSCwd96816"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex App for Web Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20104",
    "datePublished": "2023-03-03T00:00:00",
    "dateReserved": "2022-10-27T00:00:00",
    "dateUpdated": "2024-10-25T16:03:19.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20863 (GCVE-0-2022-20863)

Vulnerability from cvelistv5 – Published: 2022-09-08 12:30 – Updated: 2024-11-06 16:07
VLAI?
Summary
A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:50.300Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220907 Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20863",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T15:57:27.645977Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:07:11.915Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Meetings Desktop App",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-450",
              "description": "CWE-450",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-08T12:30:19",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220907 Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-qrtO6YC2",
        "defect": [
          [
            "CSCwb85392"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-09-07T23:00:00",
          "ID": "CVE-2022-20863",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Meetings App Character Interface Manipulation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Meetings Desktop App",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-450"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220907 Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-app-qrtO6YC2",
          "defect": [
            [
              "CSCwb85392"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20863",
    "datePublished": "2022-09-08T12:30:19.186491Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-06T16:07:11.915Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1536 (GCVE-0-2021-1536)

Vulnerability from cvelistv5 – Published: 2021-06-04 16:45 – Updated: 2024-11-07 22:09
VLAI?
Summary
A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:17.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210602 Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1536",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:41:47.180574Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T22:09:47.292Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-04T16:45:45",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210602 Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-dll-inject-XNmcSGTU",
        "defect": [
          [
            "CSCvw48667",
            "CSCvw79311",
            "CSCvw79321"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-06-02T16:00:00",
          "ID": "CVE-2021-1536",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Teams",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-427"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210602 Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-dll-inject-XNmcSGTU",
          "defect": [
            [
              "CSCvw48667",
              "CSCvw79311",
              "CSCvw79321"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1536",
    "datePublished": "2021-06-04T16:45:45.378447Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T22:09:47.292Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1502 (GCVE-0-2021-1502)

Vulnerability from cvelistv5 – Published: 2021-06-04 16:45 – Updated: 2024-11-07 22:10
VLAI?
Summary
A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:17.339Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210602 Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1502",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:43:54.958416Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T22:10:29.800Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Meetings",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-04T16:45:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210602 Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-player-dOJ2jOJ",
        "defect": [
          [
            "CSCvx30404"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-06-02T16:00:00",
          "ID": "CVE-2021-1502",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Meetings",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210602 Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-player-dOJ2jOJ",
          "defect": [
            [
              "CSCvx30404"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1502",
    "datePublished": "2021-06-04T16:45:12.255373Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T22:10:29.800Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1242 (GCVE-0-2021-1242)

Vulnerability from cvelistv5 – Published: 2021-01-13 21:17 – Updated: 2024-11-12 20:47
VLAI?
Summary
A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:02:56.315Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210113 Cisco Webex Teams Shared File Manipulation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1242",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T20:54:45.764818Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T20:47:40.135Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-01-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-450",
              "description": "CWE-450",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-13T21:17:28",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210113 Cisco Webex Teams Shared File Manipulation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-teams-7ZMcXG99",
        "defect": [
          [
            "CSCvv74842"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Teams Shared File Manipulation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-01-13T16:00:00",
          "ID": "CVE-2021-1242",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Teams Shared File Manipulation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Teams",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-450"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210113 Cisco Webex Teams Shared File Manipulation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-teams-7ZMcXG99",
          "defect": [
            [
              "CSCvv74842"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1242",
    "datePublished": "2021-01-13T21:17:28.265054Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-12T20:47:40.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3535 (GCVE-0-2020-3535)

Vulnerability from cvelistv5 – Published: 2020-10-08 04:20 – Updated: 2024-11-13 17:53
VLAI?
Summary
A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:37:55.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20201007 Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3535",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T17:17:35.931900Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T17:53:17.655Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-10-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user\u0026rsquo;s account."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-08T04:20:20",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20201007 Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-teams-dll-drsnH5AN",
        "defect": [
          [
            "CSCvu86655"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-10-07T16:00:00",
          "ID": "CVE-2020-3535",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Teams",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user\u0026rsquo;s account."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-427"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20201007 Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-teams-dll-drsnH5AN",
          "defect": [
            [
              "CSCvu86655"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3535",
    "datePublished": "2020-10-08T04:20:20.854559Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-13T17:53:17.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20236 (GCVE-0-2025-20236)

Vulnerability from nvd – Published: 2025-04-16 16:16 – Updated: 2025-04-17 03:55
VLAI?
Summary
A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.
CWE
  • CWE-829 - Inclusion of Functionality from Untrusted Control Sphere
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Webex Teams Affected: 44.6
Affected: 44.6.0.29928
Affected: 44.6.0.30148
Affected: 44.7
Affected: 44.7.0.30141
Affected: 44.7.0.30285
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20236",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-17T03:55:22.841Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "44.6"
            },
            {
              "status": "affected",
              "version": "44.6.0.29928"
            },
            {
              "status": "affected",
              "version": "44.6.0.30148"
            },
            {
              "status": "affected",
              "version": "44.7"
            },
            {
              "status": "affected",
              "version": "44.7.0.30141"
            },
            {
              "status": "affected",
              "version": "44.7.0.30285"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.\r\n\r\nThis vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-829",
              "description": "Inclusion of Functionality from Untrusted Control Sphere",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-16T17:45:31.016Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-app-client-rce-ufyMMYLC",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-client-rce-ufyMMYLC",
        "defects": [
          "CSCwn07296"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex App Client-Side Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20236",
    "datePublished": "2025-04-16T16:16:23.291Z",
    "dateReserved": "2024-10-10T19:15:13.237Z",
    "dateUpdated": "2025-04-17T03:55:22.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-26067 (GCVE-0-2020-26067)

Vulnerability from nvd – Published: 2024-11-18 16:10 – Updated: 2024-11-26 14:41
VLAI?
Summary
A vulnerability in the web-based interface of Cisco Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-26067",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T17:21:04.083089Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T14:41:03.582Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based interface of Cisco\u0026nbsp;Webex Teams could allow an authenticated, remote attacker to conduct cross-site scripting attacks.\r\nThe vulnerability is due to improper validation of usernames. An attacker could exploit this vulnerability by creating an account that contains malicious HTML or script content and joining a space using the malicious account name. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/RL:X/RC:X/E:X",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-18T16:10:34.462Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-teams-xss-zLW9tD3",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-teams-xss-zLW9tD3",
        "defects": [
          "CSCvv40214"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Webex Teams Web Interface Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-26067",
    "datePublished": "2024-11-18T16:10:24.951Z",
    "dateReserved": "2020-09-24T00:00:00.000Z",
    "dateUpdated": "2024-11-26T14:41:03.582Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20396 (GCVE-0-2024-20396)

Vulnerability from nvd – Published: 2024-07-17 16:33 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Webex Teams Affected: 3.0.13464.0
Affected: 3.0.13538.0
Affected: 3.0.13588.0
Affected: 3.0.14154.0
Affected: 3.0.14234.0
Affected: 3.0.14375.0
Affected: 3.0.14741.0
Affected: 3.0.14866.0
Affected: 3.0.15015.0
Affected: 3.0.15036.0
Affected: 3.0.15092.0
Affected: 3.0.15131.0
Affected: 3.0.15164.0
Affected: 3.0.15221.0
Affected: 3.0.15333.0
Affected: 3.0.15410.0
Affected: 3.0.15485.0
Affected: 3.0.15645.0
Affected: 3.0.15711.0
Affected: 3.0.16040.0
Affected: 3.0.16269.0
Affected: 3.0.16273.0
Affected: 3.0.16285.0
Affected: 42.1.0.21190
Affected: 42.10.0.23814
Affected: 42.11.0.24187
Affected: 42.12.0.24485
Affected: 42.2.0.21338
Affected: 42.2.0.21486
Affected: 42.3.0.21576
Affected: 42.4.1.22032
Affected: 42.5.0.22259
Affected: 42.6.0.22565
Affected: 42.6.0.22645
Affected: 42.7.0.22904
Affected: 42.7.0.23054
Affected: 42.8.0.23214
Affected: 42.8.0.23281
Affected: 42.9.0.23494
Affected: 43.1.0.24716
Affected: 43.2.0.25157
Affected: 43.2.0.25211
Affected: 43.3.0.25468
Affected: 43.4.0.25788
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20396",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-17T17:59:58.773024Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-17T18:00:53.060Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.785Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-webex-app-ZjNm8X8j",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0.13464.0"
            },
            {
              "status": "affected",
              "version": "3.0.13538.0"
            },
            {
              "status": "affected",
              "version": "3.0.13588.0"
            },
            {
              "status": "affected",
              "version": "3.0.14154.0"
            },
            {
              "status": "affected",
              "version": "3.0.14234.0"
            },
            {
              "status": "affected",
              "version": "3.0.14375.0"
            },
            {
              "status": "affected",
              "version": "3.0.14741.0"
            },
            {
              "status": "affected",
              "version": "3.0.14866.0"
            },
            {
              "status": "affected",
              "version": "3.0.15015.0"
            },
            {
              "status": "affected",
              "version": "3.0.15036.0"
            },
            {
              "status": "affected",
              "version": "3.0.15092.0"
            },
            {
              "status": "affected",
              "version": "3.0.15131.0"
            },
            {
              "status": "affected",
              "version": "3.0.15164.0"
            },
            {
              "status": "affected",
              "version": "3.0.15221.0"
            },
            {
              "status": "affected",
              "version": "3.0.15333.0"
            },
            {
              "status": "affected",
              "version": "3.0.15410.0"
            },
            {
              "status": "affected",
              "version": "3.0.15485.0"
            },
            {
              "status": "affected",
              "version": "3.0.15645.0"
            },
            {
              "status": "affected",
              "version": "3.0.15711.0"
            },
            {
              "status": "affected",
              "version": "3.0.16040.0"
            },
            {
              "status": "affected",
              "version": "3.0.16269.0"
            },
            {
              "status": "affected",
              "version": "3.0.16273.0"
            },
            {
              "status": "affected",
              "version": "3.0.16285.0"
            },
            {
              "status": "affected",
              "version": "42.1.0.21190"
            },
            {
              "status": "affected",
              "version": "42.10.0.23814"
            },
            {
              "status": "affected",
              "version": "42.11.0.24187"
            },
            {
              "status": "affected",
              "version": "42.12.0.24485"
            },
            {
              "status": "affected",
              "version": "42.2.0.21338"
            },
            {
              "status": "affected",
              "version": "42.2.0.21486"
            },
            {
              "status": "affected",
              "version": "42.3.0.21576"
            },
            {
              "status": "affected",
              "version": "42.4.1.22032"
            },
            {
              "status": "affected",
              "version": "42.5.0.22259"
            },
            {
              "status": "affected",
              "version": "42.6.0.22565"
            },
            {
              "status": "affected",
              "version": "42.6.0.22645"
            },
            {
              "status": "affected",
              "version": "42.7.0.22904"
            },
            {
              "status": "affected",
              "version": "42.7.0.23054"
            },
            {
              "status": "affected",
              "version": "42.8.0.23214"
            },
            {
              "status": "affected",
              "version": "42.8.0.23281"
            },
            {
              "status": "affected",
              "version": "42.9.0.23494"
            },
            {
              "status": "affected",
              "version": "43.1.0.24716"
            },
            {
              "status": "affected",
              "version": "43.2.0.25157"
            },
            {
              "status": "affected",
              "version": "43.2.0.25211"
            },
            {
              "status": "affected",
              "version": "43.3.0.25468"
            },
            {
              "status": "affected",
              "version": "43.4.0.25788"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\n\r This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-17T16:33:55.108Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-app-ZjNm8X8j",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-ZjNm8X8j",
        "defects": [
          "CSCwj36947"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20396",
    "datePublished": "2024-07-17T16:33:55.108Z",
    "dateReserved": "2023-11-08T15:08:07.660Z",
    "dateUpdated": "2024-08-01T21:59:41.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20395 (GCVE-0-2024-20395)

Vulnerability from nvd – Published: 2024-07-17 16:32 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information. This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user.
CWE
  • CWE-523 - Unprotected Transport of Credentials
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Webex Teams Affected: 3.0.13464.0
Affected: 3.0.13538.0
Affected: 3.0.13588.0
Affected: 3.0.14154.0
Affected: 3.0.14234.0
Affected: 3.0.14375.0
Affected: 3.0.14741.0
Affected: 3.0.14866.0
Affected: 3.0.15015.0
Affected: 3.0.15036.0
Affected: 3.0.15092.0
Affected: 3.0.15131.0
Affected: 3.0.15164.0
Affected: 3.0.15221.0
Affected: 3.0.15333.0
Affected: 3.0.15410.0
Affected: 3.0.15485.0
Affected: 3.0.15645.0
Affected: 3.0.15711.0
Affected: 3.0.16040.0
Affected: 3.0.16269.0
Affected: 3.0.16273.0
Affected: 3.0.16285.0
Affected: 4.0
Affected: 4.1
Affected: 4.10
Affected: 4.12
Affected: 4.13
Affected: 4.14
Affected: 4.15
Affected: 4.16
Affected: 4.17
Affected: 4.18
Affected: 4.19
Affected: 4.2
Affected: 4.20
Affected: 4.3
Affected: 4.4
Affected: 4.5
Affected: 4.6
Affected: 4.8
Affected: 4.9
Affected: 4.1.57
Affected: 4.1.92
Affected: 4.10.343
Affected: 4.11.211
Affected: 4.12.236
Affected: 4.13.200
Affected: 4.2.42
Affected: 4.2.75
Affected: 4.5.224
Affected: 4.6.197
Affected: 4.7.78
Affected: 4.8.170
Affected: 4.9.205
Affected: 4.9.252
Affected: 4.9.269
Affected: 42.1.0.169
Affected: 42.1.0.21190
Affected: 42.1.0.2219
Affected: 42.10
Affected: 42.10.0.23814
Affected: 42.10.0.24000
Affected: 42.11
Affected: 42.11.0.24187
Affected: 42.12
Affected: 42.12.0.24485
Affected: 42.2
Affected: 42.2.0.21338
Affected: 42.2.0.21486
Affected: 42.3
Affected: 42.3.0.21576
Affected: 42.4.1.22032
Affected: 42.5.0.22259
Affected: 42.6
Affected: 42.6.0.22565
Affected: 42.6.0.22645
Affected: 42.7
Affected: 42.7.0.22904
Affected: 42.7.0.23054
Affected: 42.8
Affected: 42.8.0.23214
Affected: 42.8.0.23281
Affected: 42.9
Affected: 42.9.0.23494
Affected: 43.1
Affected: 43.1.0.24716
Affected: 43.2
Affected: 43.2.0.25157
Affected: 43.2.0.25211
Affected: 43.3
Affected: 43.3.0.25468
Affected: 43.4
Affected: 43.4.0.25788
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:webex_teams:3.0.13464.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.13538.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.13588.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14154.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14234.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14375.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14741.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.14866.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15015.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15036.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15092.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15131.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15164.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15221.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15333.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15410.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15485.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15645.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.15711.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16040.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16269.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16273.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:3.0.16285.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.12:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.13:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.14:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.15:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.16:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.17:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.18:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.19:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.20:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.5:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.8:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.1.57:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.1.92:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.10.343:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.11.211:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.12.236:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.13.200:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.2.42:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.2.75:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.5.224:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.6.197:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.7.78:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.8.170:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9.205:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9.252:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:4.9.269:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.1.0.169:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.1.0.21190:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.1.0.2219:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.10.0.23814:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.10.0.24000:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.11:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.11.0.24187:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.12:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.12.0.24485:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.2.0.21338:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.2.0.21486:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.3.0.21576:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.4.1.22032:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.5.0.22259:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.6:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.6.0.22565:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.6.0.22645:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.7:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.7.0.22904:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.7.0.23054:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.8:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.8.0.23214:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.8.0.23281:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.9:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:42.9.0.23494:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.1:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.1.0.24716:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.2:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.2.0.25157:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.2.0.25211:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.3:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.3.0.25468:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.4:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:webex_teams:43.4.0.25788:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "webex_teams",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "3.0.13464.0"
              },
              {
                "status": "affected",
                "version": "3.0.13538.0"
              },
              {
                "status": "affected",
                "version": "3.0.13588.0"
              },
              {
                "status": "affected",
                "version": "3.0.14154.0"
              },
              {
                "status": "affected",
                "version": "3.0.14234.0"
              },
              {
                "status": "affected",
                "version": "3.0.14375.0"
              },
              {
                "status": "affected",
                "version": "3.0.14741.0"
              },
              {
                "status": "affected",
                "version": "3.0.14866.0"
              },
              {
                "status": "affected",
                "version": "3.0.15015.0"
              },
              {
                "status": "affected",
                "version": "3.0.15036.0"
              },
              {
                "status": "affected",
                "version": "3.0.15092.0"
              },
              {
                "status": "affected",
                "version": "3.0.15131.0"
              },
              {
                "status": "affected",
                "version": "3.0.15164.0"
              },
              {
                "status": "affected",
                "version": "3.0.15221.0"
              },
              {
                "status": "affected",
                "version": "3.0.15333.0"
              },
              {
                "status": "affected",
                "version": "3.0.15410.0"
              },
              {
                "status": "affected",
                "version": "3.0.15485.0"
              },
              {
                "status": "affected",
                "version": "3.0.15645.0"
              },
              {
                "status": "affected",
                "version": "3.0.15711.0"
              },
              {
                "status": "affected",
                "version": "3.0.16040.0"
              },
              {
                "status": "affected",
                "version": "3.0.16269.0"
              },
              {
                "status": "affected",
                "version": "3.0.16273.0"
              },
              {
                "status": "affected",
                "version": "3.0.16285.0"
              },
              {
                "status": "affected",
                "version": "4.0"
              },
              {
                "status": "affected",
                "version": "4.1"
              },
              {
                "status": "affected",
                "version": "4.10"
              },
              {
                "status": "affected",
                "version": "4.12"
              },
              {
                "status": "affected",
                "version": "4.13"
              },
              {
                "status": "affected",
                "version": "4.14"
              },
              {
                "status": "affected",
                "version": "4.15"
              },
              {
                "status": "affected",
                "version": "4.16"
              },
              {
                "status": "affected",
                "version": "4.17"
              },
              {
                "status": "affected",
                "version": "4.18"
              },
              {
                "status": "affected",
                "version": "4.19"
              },
              {
                "status": "affected",
                "version": "4.2"
              },
              {
                "status": "affected",
                "version": "4.20"
              },
              {
                "status": "affected",
                "version": "4.3"
              },
              {
                "status": "affected",
                "version": "4.4"
              },
              {
                "status": "affected",
                "version": "4.5"
              },
              {
                "status": "affected",
                "version": "4.6"
              },
              {
                "status": "affected",
                "version": "4.8"
              },
              {
                "status": "affected",
                "version": "4.9"
              },
              {
                "status": "affected",
                "version": "4.1.57"
              },
              {
                "status": "affected",
                "version": "4.1.92"
              },
              {
                "status": "affected",
                "version": "4.10.343"
              },
              {
                "status": "affected",
                "version": "4.11.211"
              },
              {
                "status": "affected",
                "version": "4.12.236"
              },
              {
                "status": "affected",
                "version": "4.13.200"
              },
              {
                "status": "affected",
                "version": "4.2.42"
              },
              {
                "status": "affected",
                "version": "4.2.75"
              },
              {
                "status": "affected",
                "version": "4.5.224"
              },
              {
                "status": "affected",
                "version": "4.6.197"
              },
              {
                "status": "affected",
                "version": "4.7.78"
              },
              {
                "status": "affected",
                "version": "4.8.170"
              },
              {
                "status": "affected",
                "version": "4.9.205"
              },
              {
                "status": "affected",
                "version": "4.9.252"
              },
              {
                "status": "affected",
                "version": "4.9.269"
              },
              {
                "status": "affected",
                "version": "42.1.0.169"
              },
              {
                "status": "affected",
                "version": "42.1.0.21190"
              },
              {
                "status": "affected",
                "version": "42.1.0.2219"
              },
              {
                "status": "affected",
                "version": "42.10"
              },
              {
                "status": "affected",
                "version": "42.10.0.23814"
              },
              {
                "status": "affected",
                "version": "42.10.0.24000"
              },
              {
                "status": "affected",
                "version": "42.11"
              },
              {
                "status": "affected",
                "version": "42.11.0.24187"
              },
              {
                "status": "affected",
                "version": "42.12"
              },
              {
                "status": "affected",
                "version": "42.12.0.24485"
              },
              {
                "status": "affected",
                "version": "42.2"
              },
              {
                "status": "affected",
                "version": "42.2.0.21338"
              },
              {
                "status": "affected",
                "version": "42.2.0.21486"
              },
              {
                "status": "affected",
                "version": "42.3"
              },
              {
                "status": "affected",
                "version": "42.3.0.21576"
              },
              {
                "status": "affected",
                "version": "42.4.1.22032"
              },
              {
                "status": "affected",
                "version": "42.5.0.22259"
              },
              {
                "status": "affected",
                "version": "42.6"
              },
              {
                "status": "affected",
                "version": "42.6.0.22565"
              },
              {
                "status": "affected",
                "version": "42.6.0.22645"
              },
              {
                "status": "affected",
                "version": "42.7"
              },
              {
                "status": "affected",
                "version": "42.7.0.22904"
              },
              {
                "status": "affected",
                "version": "42.7.0.23054"
              },
              {
                "status": "affected",
                "version": "42.8"
              },
              {
                "status": "affected",
                "version": "42.8.0.23214"
              },
              {
                "status": "affected",
                "version": "42.8.0.23281"
              },
              {
                "status": "affected",
                "version": "42.9"
              },
              {
                "status": "affected",
                "version": "42.9.0.23494"
              },
              {
                "status": "affected",
                "version": "43.1"
              },
              {
                "status": "affected",
                "version": "43.1.0.24716"
              },
              {
                "status": "affected",
                "version": "43.2"
              },
              {
                "status": "affected",
                "version": "43.2.0.25157"
              },
              {
                "status": "affected",
                "version": "43.2.0.25211"
              },
              {
                "status": "affected",
                "version": "43.3"
              },
              {
                "status": "affected",
                "version": "43.3.0.25468"
              },
              {
                "status": "affected",
                "version": "43.4"
              },
              {
                "status": "affected",
                "version": "43.4.0.25788"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20395",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-18T03:55:23.962265Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-18T13:23:45.549Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-webex-app-ZjNm8X8j",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0.13464.0"
            },
            {
              "status": "affected",
              "version": "3.0.13538.0"
            },
            {
              "status": "affected",
              "version": "3.0.13588.0"
            },
            {
              "status": "affected",
              "version": "3.0.14154.0"
            },
            {
              "status": "affected",
              "version": "3.0.14234.0"
            },
            {
              "status": "affected",
              "version": "3.0.14375.0"
            },
            {
              "status": "affected",
              "version": "3.0.14741.0"
            },
            {
              "status": "affected",
              "version": "3.0.14866.0"
            },
            {
              "status": "affected",
              "version": "3.0.15015.0"
            },
            {
              "status": "affected",
              "version": "3.0.15036.0"
            },
            {
              "status": "affected",
              "version": "3.0.15092.0"
            },
            {
              "status": "affected",
              "version": "3.0.15131.0"
            },
            {
              "status": "affected",
              "version": "3.0.15164.0"
            },
            {
              "status": "affected",
              "version": "3.0.15221.0"
            },
            {
              "status": "affected",
              "version": "3.0.15333.0"
            },
            {
              "status": "affected",
              "version": "3.0.15410.0"
            },
            {
              "status": "affected",
              "version": "3.0.15485.0"
            },
            {
              "status": "affected",
              "version": "3.0.15645.0"
            },
            {
              "status": "affected",
              "version": "3.0.15711.0"
            },
            {
              "status": "affected",
              "version": "3.0.16040.0"
            },
            {
              "status": "affected",
              "version": "3.0.16269.0"
            },
            {
              "status": "affected",
              "version": "3.0.16273.0"
            },
            {
              "status": "affected",
              "version": "3.0.16285.0"
            },
            {
              "status": "affected",
              "version": "4.0"
            },
            {
              "status": "affected",
              "version": "4.1"
            },
            {
              "status": "affected",
              "version": "4.10"
            },
            {
              "status": "affected",
              "version": "4.12"
            },
            {
              "status": "affected",
              "version": "4.13"
            },
            {
              "status": "affected",
              "version": "4.14"
            },
            {
              "status": "affected",
              "version": "4.15"
            },
            {
              "status": "affected",
              "version": "4.16"
            },
            {
              "status": "affected",
              "version": "4.17"
            },
            {
              "status": "affected",
              "version": "4.18"
            },
            {
              "status": "affected",
              "version": "4.19"
            },
            {
              "status": "affected",
              "version": "4.2"
            },
            {
              "status": "affected",
              "version": "4.20"
            },
            {
              "status": "affected",
              "version": "4.3"
            },
            {
              "status": "affected",
              "version": "4.4"
            },
            {
              "status": "affected",
              "version": "4.5"
            },
            {
              "status": "affected",
              "version": "4.6"
            },
            {
              "status": "affected",
              "version": "4.8"
            },
            {
              "status": "affected",
              "version": "4.9"
            },
            {
              "status": "affected",
              "version": "4.1.57"
            },
            {
              "status": "affected",
              "version": "4.1.92"
            },
            {
              "status": "affected",
              "version": "4.10.343"
            },
            {
              "status": "affected",
              "version": "4.11.211"
            },
            {
              "status": "affected",
              "version": "4.12.236"
            },
            {
              "status": "affected",
              "version": "4.13.200"
            },
            {
              "status": "affected",
              "version": "4.2.42"
            },
            {
              "status": "affected",
              "version": "4.2.75"
            },
            {
              "status": "affected",
              "version": "4.5.224"
            },
            {
              "status": "affected",
              "version": "4.6.197"
            },
            {
              "status": "affected",
              "version": "4.7.78"
            },
            {
              "status": "affected",
              "version": "4.8.170"
            },
            {
              "status": "affected",
              "version": "4.9.205"
            },
            {
              "status": "affected",
              "version": "4.9.252"
            },
            {
              "status": "affected",
              "version": "4.9.269"
            },
            {
              "status": "affected",
              "version": "42.1.0.169"
            },
            {
              "status": "affected",
              "version": "42.1.0.21190"
            },
            {
              "status": "affected",
              "version": "42.1.0.2219"
            },
            {
              "status": "affected",
              "version": "42.10"
            },
            {
              "status": "affected",
              "version": "42.10.0.23814"
            },
            {
              "status": "affected",
              "version": "42.10.0.24000"
            },
            {
              "status": "affected",
              "version": "42.11"
            },
            {
              "status": "affected",
              "version": "42.11.0.24187"
            },
            {
              "status": "affected",
              "version": "42.12"
            },
            {
              "status": "affected",
              "version": "42.12.0.24485"
            },
            {
              "status": "affected",
              "version": "42.2"
            },
            {
              "status": "affected",
              "version": "42.2.0.21338"
            },
            {
              "status": "affected",
              "version": "42.2.0.21486"
            },
            {
              "status": "affected",
              "version": "42.3"
            },
            {
              "status": "affected",
              "version": "42.3.0.21576"
            },
            {
              "status": "affected",
              "version": "42.4.1.22032"
            },
            {
              "status": "affected",
              "version": "42.5.0.22259"
            },
            {
              "status": "affected",
              "version": "42.6"
            },
            {
              "status": "affected",
              "version": "42.6.0.22565"
            },
            {
              "status": "affected",
              "version": "42.6.0.22645"
            },
            {
              "status": "affected",
              "version": "42.7"
            },
            {
              "status": "affected",
              "version": "42.7.0.22904"
            },
            {
              "status": "affected",
              "version": "42.7.0.23054"
            },
            {
              "status": "affected",
              "version": "42.8"
            },
            {
              "status": "affected",
              "version": "42.8.0.23214"
            },
            {
              "status": "affected",
              "version": "42.8.0.23281"
            },
            {
              "status": "affected",
              "version": "42.9"
            },
            {
              "status": "affected",
              "version": "42.9.0.23494"
            },
            {
              "status": "affected",
              "version": "43.1"
            },
            {
              "status": "affected",
              "version": "43.1.0.24716"
            },
            {
              "status": "affected",
              "version": "43.2"
            },
            {
              "status": "affected",
              "version": "43.2.0.25157"
            },
            {
              "status": "affected",
              "version": "43.2.0.25211"
            },
            {
              "status": "affected",
              "version": "43.3"
            },
            {
              "status": "affected",
              "version": "43.3.0.25468"
            },
            {
              "status": "affected",
              "version": "43.4"
            },
            {
              "status": "affected",
              "version": "43.4.0.25788"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information.\r\n\r This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-523",
              "description": "Unprotected Transport of Credentials",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-17T16:32:07.102Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-webex-app-ZjNm8X8j",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-ZjNm8X8j",
        "defects": [
          "CSCwj36941",
          "CSCwj36943"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20395",
    "datePublished": "2024-07-17T16:32:07.102Z",
    "dateReserved": "2023-11-08T15:08:07.659Z",
    "dateUpdated": "2024-08-01T21:59:42.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20104 (GCVE-0-2023-20104)

Vulnerability from nvd – Published: 2023-03-03 00:00 – Updated: 2024-10-25 16:03
VLAI?
Summary
A vulnerability in the file upload functionality of Cisco Webex App for Web could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending an arbitrary file to a user and persuading that user to browse to a specific URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.598Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20230301 Cisco Webex App for Web Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20104",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-25T14:36:26.938361Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-25T16:03:19.632Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams ",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2023-03-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the file upload functionality of Cisco Webex App for Web could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending an arbitrary file to a user and persuading that user to browse to a specific URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-03T00:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20230301 Cisco Webex App for Web Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-Yn8HHsMJ"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-xss-Yn8HHsMJ",
        "defect": [
          [
            "CSCwd96816"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex App for Web Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20104",
    "datePublished": "2023-03-03T00:00:00",
    "dateReserved": "2022-10-27T00:00:00",
    "dateUpdated": "2024-10-25T16:03:19.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20863 (GCVE-0-2022-20863)

Vulnerability from nvd – Published: 2022-09-08 12:30 – Updated: 2024-11-06 16:07
VLAI?
Summary
A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:50.300Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220907 Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20863",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T15:57:27.645977Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:07:11.915Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Meetings Desktop App",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-450",
              "description": "CWE-450",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-08T12:30:19",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220907 Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-app-qrtO6YC2",
        "defect": [
          [
            "CSCwb85392"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-09-07T23:00:00",
          "ID": "CVE-2022-20863",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Meetings App Character Interface Manipulation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Meetings Desktop App",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface. This vulnerability exists because the affected software does not properly handle character rendering. An attacker could exploit this vulnerability by sending messages within the application interface. A successful exploit could allow the attacker to modify the display of links or other content within the interface, potentially allowing the attacker to conduct phishing or spoofing attacks."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-450"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220907 Cisco Webex Meetings App Character Interface Manipulation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-app-qrtO6YC2",
          "defect": [
            [
              "CSCwb85392"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20863",
    "datePublished": "2022-09-08T12:30:19.186491Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-06T16:07:11.915Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1536 (GCVE-0-2021-1536)

Vulnerability from nvd – Published: 2021-06-04 16:45 – Updated: 2024-11-07 22:09
VLAI?
Summary
A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:17.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210602 Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1536",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:41:47.180574Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T22:09:47.292Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-04T16:45:45",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210602 Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-dll-inject-XNmcSGTU",
        "defect": [
          [
            "CSCvw48667",
            "CSCvw79311",
            "CSCvw79321"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-06-02T16:00:00",
          "ID": "CVE-2021-1536",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Teams",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server, Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-427"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210602 Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-dll-inject-XNmcSGTU",
          "defect": [
            [
              "CSCvw48667",
              "CSCvw79311",
              "CSCvw79321"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1536",
    "datePublished": "2021-06-04T16:45:45.378447Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T22:09:47.292Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1502 (GCVE-0-2021-1502)

Vulnerability from nvd – Published: 2021-06-04 16:45 – Updated: 2024-11-07 22:10
VLAI?
Summary
A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:11:17.339Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210602 Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1502",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-07T21:43:54.958416Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-07T22:10:29.800Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Meetings",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-04T16:45:12",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210602 Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-player-dOJ2jOJ",
        "defect": [
          [
            "CSCvx30404"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-06-02T16:00:00",
          "ID": "CVE-2021-1502",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Meetings",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Cisco Webex Network Recording Player for Windows and MacOS and Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. The vulnerability is due to insufficient validation of values within Webex recording files formatted as either Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit the vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210602 Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-dOJ2jOJ"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-player-dOJ2jOJ",
          "defect": [
            [
              "CSCvx30404"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1502",
    "datePublished": "2021-06-04T16:45:12.255373Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-07T22:10:29.800Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1242 (GCVE-0-2021-1242)

Vulnerability from nvd – Published: 2021-01-13 21:17 – Updated: 2024-11-12 20:47
VLAI?
Summary
A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:02:56.315Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210113 Cisco Webex Teams Shared File Manipulation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-1242",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T20:54:45.764818Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T20:47:40.135Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2021-01-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-450",
              "description": "CWE-450",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-13T21:17:28",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20210113 Cisco Webex Teams Shared File Manipulation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-teams-7ZMcXG99",
        "defect": [
          [
            "CSCvv74842"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Teams Shared File Manipulation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2021-01-13T16:00:00",
          "ID": "CVE-2021-1242",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Teams Shared File Manipulation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Teams",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.3",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-450"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210113 Cisco Webex Teams Shared File Manipulation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-teams-7ZMcXG99",
          "defect": [
            [
              "CSCvv74842"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2021-1242",
    "datePublished": "2021-01-13T21:17:28.265054Z",
    "dateReserved": "2020-11-13T00:00:00",
    "dateUpdated": "2024-11-12T20:47:40.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3535 (GCVE-0-2020-3535)

Vulnerability from nvd – Published: 2020-10-08 04:20 – Updated: 2024-11-13 17:53
VLAI?
Summary
A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:37:55.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20201007 Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3535",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T17:17:35.931900Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T17:53:17.655Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Webex Teams",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-10-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user\u0026rsquo;s account."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-08T04:20:20",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20201007 Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
        }
      ],
      "source": {
        "advisory": "cisco-sa-webex-teams-dll-drsnH5AN",
        "defect": [
          [
            "CSCvu86655"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-10-07T16:00:00",
          "ID": "CVE-2020-3535",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Webex Teams",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user\u0026rsquo;s account."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.8",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-427"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20201007 Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-webex-teams-dll-drsnH5AN",
          "defect": [
            [
              "CSCvu86655"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3535",
    "datePublished": "2020-10-08T04:20:20.854559Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-13T17:53:17.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}