// For flags

CVE-2020-3126

Cisco Webex Meetings Multimedia Viewer Vulnerability

Severity Score

3.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security warning dialog boxes when a room host views shared multimedia files. An authenticated, remote attacker could exploit this vulnerability by using the host role to share files within the Multimedia sharing feature and convincing a former room host to view that file. A warning dialog normally appears cautioning users before the file is displayed; however, the former host would not see that warning dialog, and any shared multimedia would be rendered within the user's browser. The attacker could leverage this behavior to conduct additional attacks by including malicious files within a targeted room host's browser window.

Una vulnerabilidad dentro de la funcionalidad Multimedia Viewer de Cisco Webex Meetings, podría permitir a un atacante remoto autenticado omitir las protecciones de seguridad. La vulnerabilidad es debido a la falta de cuadros de diálogo de advertencia de seguridad cuando un host de sala visualiza archivos multimedia compartidos. Un atacante autenticado remoto podría explotar esta vulnerabilidad al usar el rol de host para compartir archivos dentro de la funcionalidad Multimedia sharing y convencer a un antiguo host de la sala para que vea ese archivo. Un cuadro de diálogo de advertencia comúnmente aparece advirtiendo a usuarios antes de que se muestre el archivo; sin embargo, el host anterior no vería ese cuadro de diálogo de advertencia, y cualquier multimedia compartida se representaría dentro del navegador del usuario. El atacante podría aprovechar este comportamiento para llevar a cabo ataques adicionales mediante la inclusión de archivos maliciosos dentro de la ventana del navegador de un host de sala objetivo.

*Credits: Cisco would like to thank Alexandros Zacharis of European GNSS Agency (GSA) for reporting this vulnerability.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-04-13 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-284: Improper Access Control
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Webex Meetings Server
Search vendor "Cisco" for product "Webex Meetings Server"
t39.3
Search vendor "Cisco" for product "Webex Meetings Server" and version "t39.3"
-
Affected