Vulnerability Name: | CVE-2020-3419 (CCN-191962) | ||||||||||||
Assigned: | 2019-12-12 | ||||||||||||
Published: | 2020-11-18 | ||||||||||||
Updated: | 2020-12-01 | ||||||||||||
Summary: | A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit requires the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. The attacker could then exploit this vulnerability to join meetings, without appearing in the participant list, while having full access to audio, video, chat, and screen sharing capabilities. | ||||||||||||
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-913 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-3419 Source: XF Type: UNKNOWN cisco-cve20203419-sec-bypass(191962) Source: CCN Type: Security Intelligence Web site IBM Works With Cisco to Exorcise Ghosts From Webex Meetings Source: CCN Type: Cisco Security Advisory cisco-sa-webex-auth-token-3vg57A5r Cisco Webex Meetings and Cisco Webex Meetings Server Ghost Join Vulnerability Source: CISCO Type: Vendor Advisory 20201118 Cisco Webex Meetings and Cisco Webex Meetings Server Ghost Join Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |