CVE-2020-3471
18.11.2020, 19:15
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to maintain bidirectional audio despite being expelled from an active Webex session. The vulnerability is due to a synchronization issue between meeting and media services on a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit could allow the attacker to maintain the audio connection of a Webex session despite being expelled.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | webex_meetings_server | 𝑥 < 3.0 |
cisco | webex_meetings_server | 3.0:maintenance_release2 |
cisco | webex_meetings_server | 3.0:maintenance_release3 |
cisco | webex_meetings_server | 4.0 |
cisco | webex_meetings_server | 4.0:maintenance_release1 |
cisco | webex_meetings_server | 4.0:maintenance_release2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-662 - Improper SynchronizationThe software utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.