CVE-2017-12372
Cisco WebEx Network Recording Player Command Injection Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A "Cisco WebEx Network Recording Player Remote Code Execution Vulnerability" exists in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) and WebEx Recording Format (WRF) files. A remote attacker could exploit this by providing a user with a malicious ARF or WRF file via email or URL and convincing the user to launch the file. Exploitation of this could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. Cisco Bug IDs: CSCvf57234, CSCvg54868, CSCvg54870.
Existe una "Cisco WebEx Network Recording Player Remote Code Execution Vulnerability" en Cisco WebEx Network Recording Player para archivos Advanced Recording Format (ARF) y WebEx Recording Format (WRF). Un atacante podría explotar esta vulnerabilidad proporcionándole a un usuario un archivo ARF o WRF malicioso mediante correo electrónico o URL y convenciéndolo para que ejecute el archivo. Su explotación podría provocar que un reproductor afectado se cierre inesperadamente y, en algunos casos, podría permitir la ejecución de código arbitrario en el sistema de un usuario objetivo. Cisco Bug IDs: CSCvf57234, CSCvg54868, CSCvg54870.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the wbx URI handler. When parsing the register parameter, the process does not properly validate a user-supplied string before using it to execute a system command. An attacker can leverage this vulnerability to execute commands under the context of the current user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-03 CVE Reserved
- 2017-11-30 CVE Published
- 2023-11-10 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/102017 | Third Party Advisory | |
http://www.securitytracker.com/id/1039895 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Webex Meetings Server Search vendor "Cisco" for product "Webex Meetings Server" | 2.6 Search vendor "Cisco" for product "Webex Meetings Server" and version "2.6" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Webex Meetings Server Search vendor "Cisco" for product "Webex Meetings Server" | 2.7 Search vendor "Cisco" for product "Webex Meetings Server" and version "2.7" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Webex Meetings Search vendor "Cisco" for product "Webex Meetings" | t29 Search vendor "Cisco" for product "Webex Meetings" and version "t29" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Webex Meetings Search vendor "Cisco" for product "Webex Meetings" | t30 Search vendor "Cisco" for product "Webex Meetings" and version "t30" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Webex Meetings Search vendor "Cisco" for product "Webex Meetings" | t31.11.2 Search vendor "Cisco" for product "Webex Meetings" and version "t31.11.2" | - |
Affected
|