Cisco.Webex.Meetings.Command.Execution
Description
This indicates an attack attempt to exploit a Command Injection vulnerability in Cisco Webex Meeting Destop App for Windows.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. A remote attacker can exploit this by sending a crafted SMB query to execute arbitrary commands on a vulnerable server.
Affected Products
Cisco Webex Meetings Desktop App version 33.5.5 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |
Version Updates
| Date | Version | Status | Detail |
|---|---|---|---|
| 2024-06-04 | 28.800 |
Modified
|
Name:Cisco. WebEx. Meetings. Desktop. APP. Command. Injection:Cisco. Webex. Meetings. Command. Execution |
| 2019-11-22 | 15.729 |
Modified
|
Name:Cisco. Webex. Meetings. Desktop. APP. Command. Injection:Cisco. WebEx. Meetings. Desktop. APP. Command. Injection |
| 2019-06-06 | 14.627 |
Modified
|
Severity:critical:high |
| 2019-02-08 | 14.546 |
Modified
|
Sig Added |
| 2019-01-24 | 14.532 |
Modified
|
Modified |
| 2018-11-29 | 13.500 |
Modified
|
Default_action:pass:drop |
| 2018-11-13 | 13.489 |
New
|