News

Cisco warns of low-severity Webex vulnerability affecting sensitive data

Cisco warns of a low-severity vulnerability in Webex for BroadWorks, potentially exposing sensitive data through insecure SIP communication. Users are advised to take action.

Cisco warns of low-severity Webex vulnerability affecting sensitive data
Agencias

Agencias

  • March 5, 2025
  • Updated: March 5, 2025 at 5:45 PM

Cisco has issued a warning regarding a low-severity vulnerability in the 45.2 version of its Webex for BroadWorks application, potentially allowing remote access to sensitive data. This cloud collaboration solution integrates video conferencing with networks based on BroadWorks, catering to businesses with functionalities like messaging, calling, and meeting capabilities.

The vulnerability arises from the exposure of sensitive information within Session Initiation Protocol (SIP) headers. If users have configured an insecure transport for SIP communication, malicious actors could access data and credentials that may be logged in plaintext on both client and server sides. Cisco cautions that this flaw enables unauthorized users to impersonate legitimate users, posing significant security risks.

No evidence of exploitation but Cisco urges credential rotation

In response to the discovery, Cisco has advised users to restart their Webex applications to implement the necessary configuration changes that rectify the issue. For those unable to restart, the company has suggested that administrators configure secure transport for SIP communications as an alternative solution to encrypt data in transit.

Additionally, Cisco recommends that all users rotate their credentials as a precautionary measure against potential exploitation, emphasizing the importance of safeguarding sensitive information. Fortunately, there has been no evidence so far that this vulnerability has been actively exploited in the wild.

ChatGPT DOWNLOAD

This announcement follows Cisco’s early February 2025 patch release for two critical vulnerabilities affecting its Identity Services Engine, which had the potential for arbitrary command execution and sensitive data theft. The quick responses by Cisco reflect its commitment to maintaining robust security standards for its applications.

Latest Articles

Loading next article