Cisco Webex Meetings Desktop App < 33.6.4 Command Injection Vulnerability

high Nessus Plugin ID 119888

Synopsis

The remote host contains an application affected by a command injection vulnerability.

Description

The version of Cisco Webex Desktop App installed on the remote host is prior to 33.6.4, and thus, is affected by a command injection vulnerability.

Solution

Upgrade to Cisco Webex Desktop App 33.6.4 or later.

See Also

http://www.nessus.org/u?b3d7e129

Plugin Details

Severity: High

ID: 119888

File Name: cisco_webex_meetings_win_33_6_4.nasl

Version: 1.8

Type: local

Family: CGI abuses

Published: 12/27/2018

Updated: 10/23/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-15442

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:webex_meetings

Required KB Items: installed_sw/Cisco Webex Meetings, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/27/2018

Vulnerability Publication Date: 10/24/2018

Exploitable With

Core Impact

Metasploit (WebExec Authenticated User Code Execution)

Reference Information

CVE: CVE-2018-15442

BID: 105734