==================================================================== CERT-Renater Note d'Information No. 2018/VULN149 _____________________________________________________________________ DATE : 19/04/2018 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Cisco WebEx Clients. ===================================================================== https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs _____________________________________________________________________ Cisco Security Advisory: Cisco WebEx Clients Remote Code Execution Vulnerability Advisory ID: cisco-sa-20180418-wbs Revision: 1.0 For Public Release: 2018 April 18 16:00 GMT Last Updated: 2018 April 18 16:00 GMT CVE ID(s): CVE-2018-0112 CVSS Score v(3): 9.0 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H +--------------------------------------------------------------------- Summary ======= A vulnerability in Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server could allow an authenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to insufficient input validation by the Cisco WebEx clients. An attacker could exploit this vulnerability by providing meeting attendees with a malicious Flash (.swf) file via the file-sharing capabilities of the client. Exploitation of this vulnerability could allow arbitrary code execution on the system of a targeted user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs"] ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================