Lucene search

K
attackerkbAttackerKBAKB:CC64872B-7345-4184-A6C6-EDD23B47EC7D
HistoryOct 24, 2018 - 12:00 a.m.

Get System-level Code Execution Through Webex Vulnerability

2018-10-2400:00:00
attackerkb.com
22

EPSS

0.109

Percentile

95.2%

A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

Recent assessments:

space-r7 at May 09, 2019 5:57pm UTC reported:

Details

On vulnerable versions of Cisco’s Webex client software, any local or domain user can execute commands
with SYSTEM-level privileges. The software installs a service called WebExService, that once started,
will run commands at the SYSTEM level.

This exploit prompts for an Administrator verification on Windows 10 and requires credentials to exploit, but it
is still a useful exploit for targets prior to Windows 10.

Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 3