Warning: Critical Vulnerability in Cisco Webex App can be exploited for Remote Code Execution, Patch Immediately!

Image
Decorative image
Published : 17/04/2025
  • Last update: 17/04/2025
  • Affected software: Cisco Webex App versions 44.6 and 44.7
  • Type: Remote Code Execution (RCE)
  • CVE/CVSS
    → CVE-2025-20236: CVSS 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

Sources

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC

Risks

Cisco released patches for a critical vulnerability in the videoconferencing application Cisco Webex App.

The vulnerability is present in version 44.6. prior to version 44.6.2.30589 and version 44.7 of the software. A remote attacker can exploit this vulnerability by using a specially crafted meeting link to execute arbitrary code as the targeted user. This gives the attacker control over the system of the target. This means user interaction is needed but if a user clicks the malicious link, compromise is easy, and impact is high.

Exploitation of this vulnerability could severely impact the confidentiality, integrity, and availability of affected systems.

There is no evidence of the vulnerability being actively exploited at the time of writing.

Description

CVE-2025-20236
Insufficient input validation in the URL parser of the Cisco Webex App could lead a user to download arbitrary files when opening a specially crafted meeting link. A successful exploit allows the attacker to execute arbitrary commands with the privileges of the targeted user.

Recommended Actions

Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.

Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.

While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.

References

https://nvd.nist.gov/vuln/detail/CVE-2025-20236