X
Tech

Second time lucky: Cisco pushes fix for failed Webex vulnerability patch

New attack techniques have rendered the original patch useless.
Written by Charlie Osborne, Contributing Writer

Cisco has released a new patch designed to fix a failed update which has not prevented the exploit of a severe Webex vulnerability.

The original security flaw, CVE-2018-15442, is present in the Cisco Webex Meetings Desktop App for Windows and is described as a bug which "could allow an authenticated, local attacker to execute arbitrary commands as a privileged user."

Cisco's original security update was published in October in order to remedy the flaw, in which a lack of validation for user-supplied parameters in the app could be harnessed to exploit the bug.

If an attacker is successful in utilizing the vulnerability, they can force the app to run arbitrary commands with user privileges.

See also: Cisco releases fixes for remote code execution flaws in Webex Network Recording Player

"While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools," the company added.

Software releases prior to 33.6.4 -- alongside Cisco Webex Productivity Tools Releases 32.6.0 and later prior to 33.0.6 -- are impacted on Windows systems.

It was not long after the release of the first patch that researchers from SecureAuth deemed the original fix incomplete.

TechRepublic: Microsoft details the causes of its recent multi-factor authentication meltdown

The original patch only forced the service to run files signed by Webex, but failed to account for DLL-based attacks, according to the team.

"The vulnerability can be exploited by copying to a local attacker controller folder, the ptUpdate.exe binary," the researchers said in an advisory. "Also, a malicious dll must be placed in the same folder, named wbxtrace.dll. To gain privileges, the attacker must start the service with the command line: sc start webexservice install software-update 1 "attacker-controlled-path" (if the parameter 1 doesn't work, then 2 should be used)."

These findings were sent to Cisco, which acknowledged the DLL attack method. A new patch was then issued roughly a week after being informed of the issue.

CNET: Manafort reportedly visited WikiLeaks' Assange in lead-up to election

"After an additional attack method was reported to Cisco, the previous fix for this vulnerability was determined to be insufficient," Cisco says. "A new fix was developed, and the advisory was updated on November 27, 2018, to reflect which software releases include the complete fix."

Best gifts: Top tech gadgets and tools for the remote worker

Previous and related coverage

Editorial standards