QID 375672

Date Published: 2021-07-01

QID 375672: Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability(cisco-sa-webex-dll-inject-XNmcSGTU)

A vulnerability in Cisco Webex Meetings Desktop App for Windows, Cisco Webex Meetings Server,
Cisco Webex Network Recording Player for Windows, and Cisco Webex Teams for Windows
could allow an authenticated, local attacker to perform a DLL injection attack on an
affected device.

Affected Products
Following Cisco products if they are running a vulnerable release:
1. Webex Meetings Desktop App and 2. Webex Network Recording Player
Prior to 41.1.5.11
From 41.2.0 Prior to 41.2.9.23
3. Webex Teams for Windows
Prior to 41.3.0.18986
From 41.4.0.0 Prior to 41.4.0.18737
From 41.5.0 Prior to 41.5.0.18815
4.Webex Meetings Server(not supported)

QID Detection Logic (Authenticated):
The check matches for Cisco Webex Teams and Webex Desktop App and Network Recording Player file version by reading the contents of "builder.ini" file on the target.

A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of another user account.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-webex-dll-inject-XNmcSGTU for more information.

    CVEs related to QID 375672

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-webex-dll-inject-XNmcSGTU URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-dll-inject-XNmcSGTU