<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Webex App Client-Side Remote Code Execution Vulnerability in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Cisco-Webex-App-Client-Side-Remote-Code-Execution-Vulnerability/m-p/78939#M1601</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC" target="_blank" rel="noopener"&gt;Cisco Webex App Client-Side Remote Code Execution Vulnerability&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Apr 2025 15:41:40 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2025-04-18T15:41:40Z</dc:date>
    <item>
      <title>Cisco Webex App Client-Side Remote Code Execution Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/Cisco-Webex-App-Client-Side-Remote-Code-Execution-Vulnerability/m-p/78939#M1601</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC" target="_blank" rel="noopener"&gt;Cisco Webex App Client-Side Remote Code Execution Vulnerability&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2025 15:41:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cisco-Webex-App-Client-Side-Remote-Code-Execution-Vulnerability/m-p/78939#M1601</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-04-18T15:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Webex App Client-Side Remote Code Execution Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/Cisco-Webex-App-Client-Side-Remote-Code-Execution-Vulnerability/m-p/78940#M1602</link>
      <description>Thank you!</description>
      <pubDate>Fri, 18 Apr 2025 17:38:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cisco-Webex-App-Client-Side-Remote-Code-Execution-Vulnerability/m-p/78940#M1602</guid>
      <dc:creator>akkem</dc:creator>
      <dc:date>2025-04-18T17:38:38Z</dc:date>
    </item>
  </channel>
</rss>

