-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2082
       Multiple vulnerabilities have been identified in Cisco Webex
                               19 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Webex
Publisher:         Cisco Systems
Operating System:  Cisco
                   Windows
                   VMware ESX Server
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-0390 CVE-2018-0387 CVE-2018-0380
                   CVE-2018-0379  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-DOM-xss
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-dos
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-teams-rce

Comment: This bulletin contains four (4) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Webex DOM-Based Cross-Site Scripting Vulnerability

Medium
Advisory ID:
cisco-sa-20180718-webex-DOM-xss
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvj33287
 
CVE-2018-0390
 
CWE-79
 
CVSS Score:
Base 6.1
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X
CVE-2018-0390
 
CWE-79

Summary

    A vulnerability in the web framework of Cisco Webex could allow an
    unauthenticated, remote attacker to conduct a Document Object Model-based
    (DOM-based) cross-site scripting (XSS) attack against the user of the web
    interface of an affected system.

    The vulnerability is due to insufficient input validation of certain
    parameters that are passed to the affected software by using the HTTP POST
    method. An attacker who can submit malicious scripts to the affected user
    interface element could execute arbitrary script or HTML code in the user's
    browser in the context of the affected site.

    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-DOM-xss

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco Webex. For information about affected
    software releases, consult the Cisco bug ID(s) at the top of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank Gabriele Pippi for reporting this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

Action Links for This Advisory

  o Understanding Cross-Site Scripting (XSS) Threat Vectors

Related to This Advisory

  o Cross-Site Scripting

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-DOM-xss

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco Webex Network Recording Players Denial of Service Vulnerabilities

Medium
Advisory ID:
cisco-sa-20180718-webex-dos
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvh70253
CSCvh70268
CSCvh72272
CSCvh70253,CSCvh70268,CSCvh72272,CSCvh72281,CSCvh72285,CSCvi60477,CSCvi60485,
CSCvi60490,CSCvi60520,CSCvi60529,CSCvi60533
CVE-2018-0380
 
CWE-399
 
CVSS Score:
Base 5.5
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
CVE-2018-0380
 
CWE-399

Summary

    Multiple vulnerabilities exist in the Cisco Webex Network Recording Player
    for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files.
    An attacker could exploit these vulnerabilities by providing a user with a
    malicious .arf or .wrf file via email or URL and convincing the user to
    launch the file in the Webex recording players. Exploitation of these
    vulnerabilities could cause an affected player to crash, resulting in a
    denial of service (DoS) condition.

    The Cisco Webex players are applications that are used to play back Webex
    meetings that have been recorded by an online meeting attendee. The Webex
    Network Recording Player for .arf files can be automatically installed when
    the user accesses a recording that is hosted on a Webex server. The Webex
    Player for .wrf files can be downloaded manually.

    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-dos

Affected Products

  o Vulnerable Products

    These vulnerabilities affect ARF and WRF recording players available from
    Cisco Webex Meetings Suite sites, Cisco Webex Meetings Online sites, and
    Cisco Webex Meetings Server. For information about affected software
    releases, consult the Cisco bug ID(s) at the top of this advisory.

    To determine which version of the Cisco Webex Network Recording Player (for
    .arf files) or the Cisco Webex Player (for .wrf files) is installed, users
    can open the player and select the Help > About menu.

    Note: Customers who do not receive automatic software updates may be
    running versions of Cisco Webex Meetings that have reached end of software
    maintenance and should contact customer support.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Details

  o The Cisco Webex Meetings Suite services and Cisco WebEx Meetings Online are
    hosted multimedia conferencing solutions that are managed and maintained by
    Cisco Webex. Cisco Webex Meetings Server is a multimedia conferencing
    solution that customers can host in their private clouds.

    Cisco Webex Meetings services can be configured to allow recording of a
    meeting that is stored online and can be downloaded by a user in ARF
    format. These services can also record meetings directly on local computers
    in WRF format. The Cisco Webex Network Recording Player plays .arf files
    and the Cisco Webex Player plays .wrf files.

    The Network Recording Player can be automatically installed when a user
    accesses a recording file that is hosted on a Cisco Webex Meetings Suite
    site (for streaming playback mode). The Cisco Webex Network Recording
    Player can also be installed manually. The Cisco Webex Player can only be
    manually installed from the Webex site.

    The Cisco Webex Network Recording Player for .arf files is available for
    Cisco Webex Meetings Suite (WBS31, WBS32, WBS33), Cisco Webex Meetings
    Online, and for Cisco Webex Meetings Server. The Cisco Webex Player for
    .wrf files is only available for Cisco Webex Meetings Suite (WBS31, WBS32,
    and WBS33) and Cisco Webex Meetings Online. The Cisco Webex Player for .wrf
    files is not available for Cisco Webex Meetings Server.

    The vulnerabilities disclosed in this advisory affect the Cisco Webex
    Network Recording Player and the Cisco Webex Player. Windows, OS X, and
    Linux versions of the players are all affected by at least one
    vulnerability described in this advisory.

Workarounds

  o There are no workarounds that address these vulnerabilities. However, it is
    possible to remove the affected Cisco Webex Network Recording Player and
    Cisco Webex Player by following the uninstall procedure for the operating
    system. For example, in Windows, use Add or Remove Programs to uninstall
    the affected players.

    To remove Webex software completely from a system, use the Meeting Services
    Removal Tool (for Microsoft Windows users) or Mac Webex Meeting Application
    Uninstaller (for Apple Mac OS X users), available for download from the
    Cisco Collaboration Help article Cisco WebEx and 3rd Party Support
    Utilities.

    Removal of the Webex software from a Linux or UNIX-based system can be
    accomplished by following the steps in the Cisco Collaboration Help article
    How Do I Uninstall WebEx Software on a Linux or Unix Based System?.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o These vulnerabilities were reported to Cisco by Fortinet as follows:

                   Cisco Bug IDs                            Reporter
    CSCvh70253, CSCvh70268                       Kushal Arvind Shah of
                                                 Fortinet's FortiGuard Labs
    CSCvh72272, CSCvh72281, CSCvh72285           Chris Navarrete of Fortinet's
                                                 FortiGuard Labs
    CSCvi60477, CSCvi60485, CSCvi60490,          Yonghui Han of Fortinet's
    CSCvi60520, CSCvi60529, CSCvi60533           FortiGuard Labs

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-dos

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco Webex Network Recording Players Remote Code Execution Vulnerabilities

High
Advisory ID:
cisco-sa-20180718-webex-rce
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi02621
CSCvi02965
CSCvi63329
CSCvi02621,CSCvi02965,CSCvi63329,CSCvi63333,CSCvi63335,CSCvi63374,CSCvi63376,
CSCvi63377,CSCvi63391,CSCvi63392,CSCvi63396,CSCvi63495,CSCvi63497,CSCvi63498,
CSCvi82684,CSCvi82700,CSCvi82705,CSCvi82725,CSCvi82737,CSCvi82742,CSCvi82760,
CSCvi82771,CSCvj51284,CSCvj51294
CVE-2018-0379
 
CWE-119
 
CVSS Score:
Base 7.8
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0379
 
CWE-119

Summary

    Multiple vulnerabilities exist in the Cisco Webex Network Recording Player
    for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files.
    An attacker could exploit these vulnerabilities by providing a user with a
    malicious .arf or .wrf file via email or URL and convincing the user to
    launch the file in the Webex recording players. Exploitation of these
    vulnerabilities could allow arbitrary code execution on the system of a
    targeted user. There is no risk when a .arf player that is stored on a
    Webex site is played in the Webex Network Recording Player.

    The Cisco Webex players are applications that are used to play back Webex
    meetings that have been recorded by an online meeting attendee. The Webex
    Network Recording Player for .arf files can be automatically installed when
    the user accesses a recording that is hosted on a Webex server. The Webex
    Player for .wrf files can be downloaded manually.

    Cisco has updated affected versions of the ARF and WRF recording players on
    Cisco Webex Meetings Suite sites, Cisco Webex Meetings Online sites, and
    Cisco Webex Meetings Server. There are no workarounds that address these
    vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-rce

Affected Products

  o Vulnerable Products

    These vulnerabilities affect ARF and WRF recording players available from
    Cisco Webex Meetings Suite sites, Cisco Webex Meetings Online sites, and
    Cisco Webex Meetings Server. The following versions of ARF and WRF
    recording players are affected:

      - Cisco Webex Meetings Suite (WBS31) - Webex Network Recording Player and
        Webex Player versions prior to WBS31.23
      - Cisco Webex Meetings Suite (WBS32) - Webex Network Recording Player and
        Webex Player versions prior to WBS32.15
      - Cisco Webex Meetings Suite (WBS33) - Webex Network Recording Player and
        Webex Player versions prior to WBS33.2
      - Cisco Webex Meetings Online - Webex Network Recording Player and WebEx
        Player versions prior to 1.3.35
      - Cisco Webex Meetings Server - Webex Network Recording Player versions
        prior to 3.0MR1
    To determine which version of the Cisco Webex Network Recording Player (for
    .arf files) or the Cisco Webex Player (for .wrf files) is installed, users
    can open the player and select the Help > About menu.

    Note: Customers who do not receive automatic software updates may be
    running versions of Cisco Webex Meetings that have reached end of software
    maintenance and should contact customer support.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Details

  o The Cisco Webex Meetings Suite services and Cisco WebEx Meetings Online are
    hosted multimedia conferencing solutions that are managed and maintained by
    Cisco Webex. Cisco Webex Meetings Server is a multimedia conferencing
    solution that customers can host in their private clouds.

    Cisco Webex Meetings services can be configured to allow recording of a
    meeting that is stored online and can be downloaded by a user in ARF
    format. These services can also record meetings directly on local computers
    in WRF format. The Cisco Webex Network Recording Player plays .arf files
    and the Cisco Webex Player plays .wrf files.

    The Network Recording Player can be automatically installed when a user
    accesses a recording file that is hosted on a Cisco Webex Meetings Suite
    site (for streaming playback mode). The Cisco Webex Network Recording
    Player can also be installed manually. The Cisco Webex Player can only be
    manually installed from the Webex site.

    The Cisco Webex Network Recording Player for .arf files is available for
    Cisco Webex Meetings Suite (WBS31, WBS32, WBS33), Cisco Webex Meetings
    Online, and for Cisco Webex Meetings Server. The Cisco Webex Player for
    .wrf files is only available for Cisco Webex Meetings Suite (WBS31, WBS32,
    and WBS33) and Cisco Webex Meetings Online. The Cisco Webex Player for .wrf
    files is not available for Cisco Webex Meetings Server.

    The vulnerabilities disclosed in this advisory affect the Cisco Webex
    Network Recording Player and the Cisco Webex Player. Windows, OS X, and
    Linux versions of the players are all affected by at least one
    vulnerability described in this advisory.

Workarounds

  o There are no workarounds that address these vulnerabilities. However, it is
    possible to remove the affected Cisco Webex Network Recording Player and
    Cisco Webex Player by following the uninstall procedure for the operating
    system. For example, in Windows, use Add or Remove Programs to uninstall
    the affected players.

    To remove Webex software completely from a system, use the Meeting Services
    Removal Tool (for Microsoft Windows users) or Mac Webex Meeting Application
    Uninstaller (for Apple Mac OS X users), available for download from the
    Cisco Collaboration Help article Cisco WebEx and 3rd Party Support
    Utilities.

    Removal of the Webex software from a Linux or UNIX-based system can be
    accomplished by following the steps in the Cisco Collaboration Help article
    How Do I Uninstall WebEx Software on a Linux or Unix Based System?.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    The following versions of the Cisco Webex Network Recording Player and the
    Cisco Webex Player available from the Cisco Webex Meetings Suite sites
    (WBS31, WBS32, WBS33), Cisco Webex Meetings Online site, and Cisco Webex
    Meetings Server address all the vulnerabilities described in this advisory:
      - Cisco Webex Meetings Suite (WBS31) - Cisco Webex Network Recording
        Player and Cisco Webex Player versions WBS31.23 and later
      - Cisco Webex Meetings Suite (WBS32) - Cisco Webex Network Recording
        Player and Cisco Webex Player versions WBS32.15 and later
      - Cisco Webex Meetings Suite (WBS33) - Cisco Webex Network Recording
        Player and Cisco Webex Player versions WBS33.2 and later
      - Cisco Webex Meetings Online - Webex Network Recording Player and WebEx
        Player versions 1.3.35 and later
      - Cisco Webex Meetings Server - Webex Network Recording Player versions
        3.0MR1 and later

    Alternatively, the latest versions of the ARF and WRF players are available
    from http://www.webex.com/play-webex-recording.html.

    To determine whether a Cisco Webex meeting site has an updated version of
    the Cisco Webex Players, users can sign into their Cisco Webex Meetings
    site and go to the Support > Downloads section. The version is displayed on
    the right side of the page under About Webex Meetings.

    The Cisco Webex Network Recording Player (for .arf files) will be
    automatically upgraded to the latest, nonvulnerable version when users
    access a recording file that is hosted on a Cisco Webex Meetings site that
    contains the versions previously specified. Users will need to manually
    uninstall the Cisco Webex Player and get the updated version of the Cisco
    Webex Player from http://www.webex.com/play-webex-recording.html or from a
    Cisco Webex Meetings site specified previously.

    Note: Customers on lockdown sites will not automatically get updated
    versions of the Cisco Webex Network Recording Player and Cisco Webex
    Player. Contact Webex Support to update a Cisco Webex site and get the
    updated version of the Cisco Webex Recording Players from http://
    www.webex.com/play-webex-recording.html.

     Cisco Bug                        First Fixed Release
        ID      WBS31  WBS32   WBS33     Webex Meetings       Webex Meetings
                                             Online               Server
     CSCvi02621  31.23  32.15  33.2                         
     CSCvi02965                        1.3.35               
     CSCvi63329  31.23  32.15  33.2                         
     CSCvi63333                                             3.0MR1
     CSCvi63335                        1.3.35               
     CSCvi63374  31.23  32.15  33.2                         
     CSCvi63376                                             3.0MR1
     CSCvi63377                        1.3.35               
                               33.0.6
                               
     CSCvi63391  31.23  32.15 33.1.1                        
                                33.2

     CSCvi63392                                             3.0MR1
     CSCvi63396                        1.3.35               
     CSCvi63495  31.23  32.15  33.2                         
     CSCvi63497                                             3.0MR1
     CSCvi63498                        1.3.35               
     CSCvi82684  31.23         33.2                         
     CSCvi82700                                             3.0MR1
     CSCvi82705                        1.3.35               
     CSCvi82725  31.23  32.15  33.2                         
     CSCvi82737                                             3.0MR1
     CSCvi82742                        1.3.35               
     CSCvi82760  31.23  32.15  33.2                         
     CSCvi82771                        1.3.35               
     CSCvj51284         32.15  33.2                         
     CSCvj51294                        1.3.35               

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o These vulnerabilities were reported to Cisco by Fortinet and Trend Micro as
    follows:

                           Cisco Bug IDs                           Reporter
                                                                Kushal Arvind
    CSCvi02621, CSCvi02965                                      Shah of
                                                                Fortinet's
                                                                FortiGuard Labs
    CSCvi63329, CSCvi63333, CSCvi63335, CSCvi63374, CSCvi63376, b0nd working
    CSCvi63377, CSCvi63391, CSCvi63392, CSCvi63396, CSCvi82684, with Trend
    CSCvi82700, CSCvi82705, CSCvi82725, CSCvi82737, CSCvi82742, Micro's Zero
    CSCvj51284, CSCvj51294                                      Day Initiative
                                                                Steven Seeley
                                                                of Source
    CSCvi63495, CSCvi63497, CSCvi63498, CSCvi82760, CSCvi82771  Incite working
                                                                with Trend
                                                                Micro's Zero
                                                                Day Initiative


Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-rce

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco Webex Teams Remote Code Execution Vulnerability

Medium
Advisory ID:
cisco-sa-20180718-webex-teams-rce
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvh66250
 
CVE-2018-0387
 
CWE-20
 
CVSS Score:
Base 6.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
CVE-2018-0387
 
CWE-20
 
Summary

    A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote
    attacker to execute arbitrary code on the user's device, possibly with
    elevated privileges.

    The vulnerability occurs because Cisco Webex Teams does not properly
    sanitize input. An attacker could exploit the vulnerability by sending a
    user a malicious link and persuading the user to follow the link. A
    successful exploit could allow the attacker to execute arbitrary code on
    the user's system.

    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-teams-rce

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco Webex Teams for Windows and Cisco Webex
    Teams for MacOS. For information about affected software releases, consult
    the Cisco bug ID(s) at the top of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco Webex
    Teams for Android or Cisco Webex Teams for iPhone.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank Alexey Sintsov from HERE Technologies for
    reporting this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-webex-teams-rce

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=j3UI
-----END PGP SIGNATURE-----