A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting. This vulnerability is due to a lack of protection against brute forcing of the host key. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Webex Meetings Server site. A successful exploit would require the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. A successful exploit could allow the attacker to acquire or take over the host role for a meeting.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Webex_meetings | Cisco | * | 40.12.0 (excluding) |
Webex_meetings_server | Cisco | * | 3.0 (excluding) |
Webex_meetings_server | Cisco | 3.0 (including) | 3.0 (including) |
Webex_meetings_server | Cisco | 3.0-maintenance_release1 (including) | 3.0-maintenance_release1 (including) |
Webex_meetings_server | Cisco | 3.0-maintenance_release2 (including) | 3.0-maintenance_release2 (including) |
Webex_meetings_server | Cisco | 3.0-maintenance_release3 (including) | 3.0-maintenance_release3 (including) |
Webex_meetings_server | Cisco | 3.0-maintenance_release4 (including) | 3.0-maintenance_release4 (including) |
Webex_meetings_server | Cisco | 4.0 (including) | 4.0 (including) |
Webex_meetings_server | Cisco | 4.0-maintenance_release1 (including) | 4.0-maintenance_release1 (including) |
Webex_meetings_server | Cisco | 4.0-maintenance_release2 (including) | 4.0-maintenance_release2 (including) |
Webex_meetings_server | Cisco | 4.0-maintenance_release3 (including) | 4.0-maintenance_release3 (including) |
Common protection mechanisms include:
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].
Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]