Fortinet Discovers Cisco WebEx Network Recording Player And WebEx Player Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Cisco WebEx products.
Cisco WebEx Network Recording Player and WebEx Player are free tools to watch, share, and edit Cisco WebEx recordings developed and published by Cisco Systems for macOS and Windows.
A memory corruption vulnerability has been discovered in these Cisco WebEx products. The vulnerability exists because the vulnerable software can't correctly parse a crafted arf file which causes an out-of-bounds memory access. It could allow malicious users to cause a process crash resulting in a Denial of service (DoS) condition for the player application.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Apr 17, 2020
Users should apply the solution provided by Cisco Systems.
Fortinet reported the vulnerability to Cisco Systems on February 09, 2020.
Cisco Systems confirmed the vulnerability on February 10, 2020.
Cisco Systems patched the vulnerability on June 04, 2020.
This vulnerability was discovered by Kexu Wang of Fortinet's FortiGuard Labs.