CVE-2020-3541
04.09.2020, 03:15
A vulnerability in the media engine component of Cisco Webex Meetings Client for Windows, Cisco Webex Meetings Desktop App for Windows, and Cisco Webex Teams for Windows could allow an authenticated, local attacker to gain access to sensitive information. The vulnerability is due to unsafe logging of authentication requests by the affected software. An attacker could exploit this vulnerability by reading log files that are stored in the application directory. A successful exploit could allow the attacker to gain access to sensitive information, which could be used in further attacks.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | webex_meetings | 𝑥 < 39.5.25 |
cisco | webex_meetings | 𝑥 < 39.5.25 |
cisco | webex_meetings | 40.6.0 ≤ 𝑥 < 40.6.6 |
cisco | webex_meetings | 40.6.0 ≤ 𝑥 < 40.6.6 |
cisco | webex_teams | 𝑥 < 3.0.15711.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-532 - Insertion of Sensitive Information into Log FileInformation written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.