CVE Vulnerabilities

CVE-2021-1311

Improper Restriction of Excessive Authentication Attempts

Published: Jan 13, 2021 | Modified: Apr 11, 2024
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVSS 2.x
5.5 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting. This vulnerability is due to a lack of protection against brute forcing of the host key. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Webex Meetings Server site. A successful exploit would require the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. A successful exploit could allow the attacker to acquire or take over the host role for a meeting.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Webex_meetings Cisco * 40.12.0 (excluding)
Webex_meetings_server Cisco * 3.0 (excluding)
Webex_meetings_server Cisco 3.0 (including) 3.0 (including)
Webex_meetings_server Cisco 3.0-maintenance_release1 (including) 3.0-maintenance_release1 (including)
Webex_meetings_server Cisco 3.0-maintenance_release2 (including) 3.0-maintenance_release2 (including)
Webex_meetings_server Cisco 3.0-maintenance_release3 (including) 3.0-maintenance_release3 (including)
Webex_meetings_server Cisco 3.0-maintenance_release4 (including) 3.0-maintenance_release4 (including)
Webex_meetings_server Cisco 4.0 (including) 4.0 (including)
Webex_meetings_server Cisco 4.0-maintenance_release1 (including) 4.0-maintenance_release1 (including)
Webex_meetings_server Cisco 4.0-maintenance_release2 (including) 4.0-maintenance_release2 (including)
Webex_meetings_server Cisco 4.0-maintenance_release3 (including) 4.0-maintenance_release3 (including)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References