Overview
- Description
- A "Cisco WebEx Network Recording Player Remote Code Execution Vulnerability" exists in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) and WebEx Recording Format (WRF) files. A remote attacker could exploit this by providing a user with a malicious ARF or WRF file via email or URL and convincing the user to launch the file. Exploitation of this could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. Cisco Bug IDs: CSCvf57234, CSCvg54868, CSCvg54870.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.6
- Impact score
- 6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C3AA626-3B37-434B-A6CB-7CA233B8FC04" }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFAAD0CF-0CAA-4D8B-A12F-9BAF1DC3CD6D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:webex_meetings:t29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "248B8D80-F316-4A9D-BCB9-F3308E52F611" }, { "criteria": "cpe:2.3:a:cisco:webex_meetings:t30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74804E27-323D-438F-912A-EFBE76F7ED4E" }, { "criteria": "cpe:2.3:a:cisco:webex_meetings:t31.11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E425A87-ECFD-4F30-AB93-0B8B91FB445E" } ], "operator": "OR" } ] } ]