// For flags

CVE-2019-1772

Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

Una vulnerabilidad en Cisco Webex Network Recording Player para Microsoft Windows y Cisco Webex Player para Microsoft Windows podría permitir que un atacante ejecute código arbitrario en un sistema afectado. La vulnerabilidad existe porque el programa afectado valida incorrectamente los archivos de Formato de grabación avanzado (ARF) y Formato de grabación Webex (WRF). Un atacante podría aprovechar esta vulnerabilidad enviando a un usuario un archivo ARF o WRF malintencionado a través de un enlace o adjunto de correo electrónico y persuadiendo al usuario para que abra el archivo con el programa afectado en el sistema local. Una explotación exitosa podría permitir al atacante ejecutar código arbitrario en el sistema afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-05-15 CVE Published
  • 2023-10-11 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Webex Business Suite
Search vendor "Cisco" for product "Webex Business Suite"
< 39.1.0.471
Search vendor "Cisco" for product "Webex Business Suite" and version " < 39.1.0.471"
-
Affected
Cisco
Search vendor "Cisco"
Webex Business Suite Lockdown
Search vendor "Cisco" for product "Webex Business Suite Lockdown"
< 33.6.11
Search vendor "Cisco" for product "Webex Business Suite Lockdown" and version " < 33.6.11"
-
Affected
Cisco
Search vendor "Cisco"
Webex Meetings Online
Search vendor "Cisco" for product "Webex Meetings Online"
< 1.3.42
Search vendor "Cisco" for product "Webex Meetings Online" and version " < 1.3.42"
-
Affected
Cisco
Search vendor "Cisco"
Webex Meetings Server
Search vendor "Cisco" for product "Webex Meetings Server"
2.8\(1\)
Search vendor "Cisco" for product "Webex Meetings Server" and version "2.8\(1\)"
-
Affected
Cisco
Search vendor "Cisco"
Webex Meetings Server
Search vendor "Cisco" for product "Webex Meetings Server"
3.0\(1\)
Search vendor "Cisco" for product "Webex Meetings Server" and version "3.0\(1\)"
-
Affected