Unknown
CVE-2017-6753
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- webex event center t30 base,
- webex event center t31 base,
- webex event center t32 base,
- webex meeting center t30 base,
- webex meeting center t31 base,
- webex meeting center t32 base,
- webex meetings server 1.1 base,
- webex meetings server 1.5 base,
- webex meetings server 1.5.1.131,
- webex meetings server 1.5.1.6,
- webex meetings server 2.0 base,
- webex meetings server 2.0 mr2,
- webex meetings server 2.0 mr3,
- webex meetings server 2.0 mr4,
- webex meetings server 2.0 mr5,
- webex meetings server 2.0 mr6,
- webex meetings server 2.0 mr7,
- webex meetings server 2.0 mr8,
- webex meetings server 2.0 mr8 patch 1,
- webex meetings server 2.0 mr9,
- webex meetings server 2.0 mr9 patch 1,
- webex meetings server 2.0 mr9 patch 2,
- webex meetings server 2.0 mr9 patch 3,
- webex meetings server 2.0.1.107,
- webex meetings server 2.5 base,
- webex meetings server 2.5 mr1,
- webex meetings server 2.5 mr2,
- webex meetings server 2.5 mr2 patch 1,
- webex meetings server 2.5 mr3,
- webex meetings server 2.5 mr4,
- webex meetings server 2.5 mr5,
- webex meetings server 2.5 mr5 patch 1,
- webex meetings server 2.5 mr6,
- webex meetings server 2.5 mr6 patch 1,
- webex meetings server 2.5 mr6 patch 2,
- webex meetings server 2.5 mr6 patch 3,
- webex meetings server 2.5 mr6 patch 4,
- webex meetings server 2.5.1.29,
- webex meetings server 2.5.1.5,
- webex meetings server 2.5.99.2,
- webex meetings server 2.6 mr1,
- webex meetings server 2.6 mr1 patch 1,
- webex meetings server 2.6 mr2,
- webex meetings server 2.6 mr2 patch 1,
- webex meetings server 2.6 mr3,
- webex meetings server 2.6 mr3 patch 1,
- webex meetings server 2.6 mr3 patch 2,
- webex meetings server 2.6.0,
- webex meetings server 2.6.1.39,
- webex meetings server 2.7 base,
- webex meetings server 2.7 mr1,
- webex meetings server 2.7 mr1 patch 1,
- webex meetings server 2.7 mr2,
- webex meetings server 2.7 mr2 patch 1,
- webex meetings server 2.7.1,
- webex meetings server 2.8 base,
- webex meetings t30 base,
- webex support center t30 base,
- webex support center t31 base,
- webex support center t32 base,
- webex training center t30 base,
- webex training center t31 base,
- webex training center t32 base
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: