Rewterz
Rewterz Threat Advisory – Recent Malicious IPs, Domains and their Impacts
November 27, 2018
Rewterz
Rewterz Threat Advisory – SamSam Ransomware launches cyber-attacks worldwide
December 4, 2018

Rewterz Threat Advisory – CVE-2018-15442 – Cisco WebEx Meetings Elevation of Privilege Vulnerability

A vulnerability in the update service command of Cisco WebEx Meetings Desktop App can be exploited using a crafted argument to gain system privileges.

 

 

IMPACT:  MEDIUM

 

 

PUBLISH DATE:  28-11-2018

 

 

OVERVIEW

 

 

The update service of Cisco Webex Meetings Desktop App for Windows contains a flaw which can be exploited by an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. The vendor has released updates.

 

 

ANALYSIS

 

 

This is a code injection or an OS command injection vulnerability. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the vulnerability requires local access for an attacker to execute code, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

 

 

The vulnerability can be exploited by copying to a local attacker controller folder, the ptUpdate.exe binary. Also, a malicious dll must be placed in the same folder, named wbxtrace.dll. To gain privileges, the attacker must start the service with the command line: sc start webexservice install software-update 1 “attacker-controlled-path” (if the parameter 1 doesn’t work, then 2 should be used)

 

 

PROOF OF CONCEPT

 

Proof of concept exists for this vulnerability. Follow the link to access it.

 

https://www.secureauth.com/labs/advisories/cisco-webex-meetings-elevation-privilege-vulnerability

 

 

AFFECTED PRODUCTS

 

 

Cisco Webex Meetings Desktop App releases prior to 33.6.4

Cisco Webex Productivity Tools releases 32.6.0 and later prior to 33.0.6

(running on a Microsoft Windows end-user system.)

 

 

UPDATES

 

 

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181024-webex-injection

 

If you think you’re a victim of a cyber-attack, immediately send an email to soc@rewterz.com for a quick response.