Overview
The Cisco WebEx extensions for Chrome, Firefox, and Internet Explorer allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable Windows system.
Description
Cisco WebEx is a suite of online meeting software. WebEx meetings are usually joined through a web browser link. The WebEx software is launched through use of a web browser extension. The Cisco WebEx web browser extension allows a remote attacker to execute arbitrary code on a vulnerable Windows system. The WebEx Google Chrome extension versions older than 1.0.7 are affected. |
Impact
By convincing a user to visit a specially-crafted web page, a remote attacker may be able to execute arbitrary code on a vulnerable system. |
Solution
Apply an update |
Disable the WebEx ActiveX control in Internet Explorer {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Temporal | 6.8 | E:F/RL:W/RC:C |
Environmental | 6.8 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170124-webex
- https://help.webex.com/docs/DOC-2672
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1096
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1100
- https://blog.filippo.io/webex-extension-vulnerability/
- https://msdn.microsoft.com/en-us/library/dd433050(v=vs.85).aspx#_user
Acknowledgements
This vulnerability was publicly reported by Tavis Ormandy.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2017-3823 |
Date Public: | 2017-01-23 |
Date First Published: | 2017-01-27 |
Date Last Updated: | 2017-01-27 18:55 UTC |
Document Revision: | 17 |