
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN199
_____________________________________________________________________

DATE                : 16/04/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Cisco Webex Network Recording
                             Player, Cisco Webex Player.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-Q7Rtgvby
_____________________________________________________________________

Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary
Code Execution Vulnerability

Priority:        High

Advisory ID:     cisco-sa-webex-player-Q7Rtgvby

First Published: 2020 April 15 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds available

Cisco Bug IDs:   CSCvs56936CSCvs56937CSCvs56938

CVE-2020-3194

CWE-119

CVSS Score:
7.8  AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X



Summary

  o A vulnerability in Cisco Webex Network Recording Player for
    Microsoft Windows and Cisco Webex Player for Microsoft Windows could
    allow an attacker to execute arbitrary code on an affected system.

    The vulnerability exists due to insufficient validation of certain
    elements with a Webex recording stored in either the Advanced
    Recording Format (ARF) or the Webex Recording Format (WRF). An
    attacker could exploit this vulnerability by sending a user a
    malicious ARF or WRF file through a link or email attachment and
    persuading the user to open the file with the affected software on
    the local system. A successful exploit could allow the attacker to
    execute arbitrary code on the affected system with the privileges of
    the targeted user.

    Cisco has released software updates that address this vulnerability.
    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-Q7Rtgvby


Affected Products

  o Vulnerable Products

    This vulnerability affects the following releases of Cisco Webex
    Network Recording Player for Microsoft Windows and Cisco Webex
    Player for Microsoft Windows, which are available from Cisco Webex
    Meetings sites and Cisco Webex Meetings Server:

       Cisco Webex Meetings sites - All Webex Network Recording Player
       and Webex Player releases earlier than Release WBS 39.5.18 or
       Release WBS 40.2
       Cisco Webex Meetings Online sites - All Webex Network Recording
       Player and Webex Player releases earlier than Release 1.3.48
       Cisco Webex Meetings Server - All Webex Network Recording Player
       releases earlier than Release 4.0MR3

    To determine which release of Cisco Webex Network Recording Player
    or Cisco Webex Player is installed on a system, open the player and
    choose Help > About .


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
    advisory are known to be affected by this vulnerability.


Details

  o Cisco Webex Meetings services and Cisco Webex Meetings Online are
    hosted, multimedia conferencing solutions that are managed and
    maintained by Cisco Webex. Cisco Webex Meetings Server is a
    multimedia conferencing solution that customers host, manage, and
    maintain in their private clouds.

    Cisco Webex Meetings services can be configured to allow users to
    store meeting recordings online and download those recordings as ARF
    files. These services can also be configured to allow users to
    record meetings directly on their local computers as WRF files.

    Cisco Webex Network Recording Player is the application that is used
    to play back ARF files. It is available from Cisco Webex Meetings
    sites, Cisco Webex Meetings Online, and Cisco Webex Meetings Server.
    The player can be installed manually from a user's Cisco Webex
    website download page in Classic view, or from the Cisco Webex Video
    Recording page.

    Cisco Webex Player is the application that is used to play back WRF
    files.
    It is available from Cisco Webex Meetings sites and Cisco Webex
    Meetings Online. It is not available from Cisco Webex Meetings
    Server. The player can be installed manually from a user's Cisco
    Webex website download page in Classic view, or from the Cisco Webex
    Video Recording page.


Workarounds

  o There are no workarounds that address this vulnerability.


Fixed Software

  o Cisco has released free software updates that address the
    vulnerability described in this advisory. Customers may only install
    and expect support for software versions and feature sets for which
    they have purchased a license. By installing, downloading,
    accessing, or otherwise using such software upgrades, customers
    agree to follow the terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
    have a valid license, procured from Cisco directly, or through a
    Cisco authorized reseller or partner. In most cases this will be a
    maintenance upgrade to software that was previously purchased. Free
    security software updates do not entitle customers to a new software
    license, additional software feature sets, or major revision
    upgrades.

    When considering software upgrades , customers are advised to
    regularly consult the advisories for Cisco products, which are
    available from the Cisco Security Advisories and Alerts page , to
    determine exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be
    upgraded contain sufficient memory and confirm that current hardware
    and software configurations will continue to be supported properly
    by the new release.
    If the information is not clear, customers are advised to contact
    the Cisco Technical Assistance Center (TAC) or their contracted
    maintenance providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
    service contract and customers who make purchases through
    third-party vendors but are unsuccessful in obtaining fixed software
    through their point of sale should obtain upgrades by contacting the
    Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
    prepared to provide the URL of this advisory as evidence of
    entitlement to a free upgrade.

    Fixed Releases

    Customers are advised to upgrade to an appropriate fixed software
    release as indicated in the following table:

               Cisco Webex Platform                   First Fixed Release
    Webex Meetings 39.5.x Sites                 39.5.18
    Webex Meetings Latest Sites                 40.2
    Webex Meetings Online                       1.3.48
    Webex Meetings Server                       4.0MR2SecurityPatch3

    Customers can download the Cisco Webex Network Recording Player or
    Cisco Webex Player from a user's Cisco Webex website download page
    in Classic view from the above fixed versions of Cisco Webex
    Meetings or Cisco Webex Meetings Server, or from the Cisco Webex
    Video Recording page.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not
    aware of any public announcements or malicious use of the
    vulnerability that is described in this advisory.


Source

  o Cisco would like to thank Kexu Wang of Fortinet's FortiGuard Labs
    for reporting these vulnerabilities.


Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document
    also contains instructions for obtaining fixed software and
    receiving security vulnerability information from Cisco.

URL

  o
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-player-Q7Rtgvby


Revision History

  o
+----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |   Date|

+----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  |
2020-APR-15  |

+----------+---------------------------+----------+--------+--------------+

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================






