CVE Vulnerabilities

CVE-2021-1311

Improper Restriction of Excessive Authentication Attempts

Published: Jan 13, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVSS 2.x
5.5 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting. This vulnerability is due to a lack of protection against brute forcing of the host key. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Webex Meetings Server site. A successful exploit would require the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. A successful exploit could allow the attacker to acquire or take over the host role for a meeting.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.

Affected Software

NameVendorStart VersionEnd Version
Webex_meetingsCisco*40.12.0 (excluding)
Webex_meetings_serverCisco*3.0 (excluding)
Webex_meetings_serverCisco3.0 (including)3.0 (including)
Webex_meetings_serverCisco3.0-maintenance_release1 (including)3.0-maintenance_release1 (including)
Webex_meetings_serverCisco3.0-maintenance_release2 (including)3.0-maintenance_release2 (including)
Webex_meetings_serverCisco3.0-maintenance_release3 (including)3.0-maintenance_release3 (including)
Webex_meetings_serverCisco3.0-maintenance_release4 (including)3.0-maintenance_release4 (including)
Webex_meetings_serverCisco4.0 (including)4.0 (including)
Webex_meetings_serverCisco4.0-maintenance_release1 (including)4.0-maintenance_release1 (including)
Webex_meetings_serverCisco4.0-maintenance_release2 (including)4.0-maintenance_release2 (including)
Webex_meetings_serverCisco4.0-maintenance_release3 (including)4.0-maintenance_release3 (including)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References