Cisco Webex security flaw could let hackers hijack your system via a meeting invite


- Cisco found and fixed three vulnerabilities, including a high-severity one
- The high-severity issue was found in the Cisco Webex app
- It allowed criminals to run commands remotely
Cisco has patched a high-severity vulnerability in its Webex video conferencing platform which allowed threat actors to mount remote code execution (RCE) attacks against exposed endpoints.
The bug was discovered in the custom URL parser of a Cisco Webex app and is described as an “insufficient input validation” vulnerability.
“An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files,” the bug’s NVD page reads. “A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.”
No revolution
The vulnerability is tracked as CVE-2024-20236, and was assigned a severity score of 8.8/10 (high).
Cisco further explained that the vulnerability is present in all older versions of the product, regardless of the OS it’s running on, or system configurations.
The networking giant also said there were no workarounds for the bug, so installing the update is the only way to mitigate the risk.
While the most severe, it’s not the only vulnerability Cisco recently addressed. The company also fixed two more flaws, CVE-2025-20178 (6.0/10), and CVE-2025-20150 (5.3/10).
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The former is a privilege escalation flaw in Secure Networks Analytics’ web-based management interface, and allows threat actors to run arbitrary controls as root, with admin credentials.
The latter was found in a Nexus Dashboard, and allows threat actors to enumerate LDAP user accounts remotely, separating valid accounts from the invalid ones.
The good news is that the vulnerabilities are not yet being exploited in the wild, BleepingComputer reports, citing analysis from the company’s Product Security Incident Response Team (PSIRT).
Cisco’s equipment, both software and hardware, are popular in both the enterprise and in consumer households. That makes them a prime target for threat actors, both state-sponsored and profit-oriented.
Via BleepingComputer
You might also like
Cisco found and fixed three vulnerabilities, including a high-severity one The high-severity issue was found in the Cisco Webex app It allowed criminals to run commands remotely Cisco has patched a high-severity vulnerability in its Webex video conferencing platform which allowed threat actors to mount remote code execution (RCE) attacks…
Recent Posts
- The Best Shapewear (2025): Bodysuits, Briefs, and More
- Cisco Webex security flaw could let hackers hijack your system via a meeting invite
- The Last of Us ripped off the Band-aid
- ASUS reveals critical security flaw affecting AiCloud routers, so patch now
- The OnePlus 13T’s battery just got revealed, and it could come with a surprising twist
Archives
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010