Cisco Webex had some very spooky security flaws

As organizations around the world turned to video conferencing software to stay in touch while working from home during the pandemic, so t...

As organizations around the world turned to video conferencing software to stay in touch while working from home during the pandemic, so too did IBM with Cisco Webex being its primary tool for holding remote meetings.

IBM Research and IBM's Office of the CISO then took a deeper look at the collaboration tools being used for day-to-day work to better understand how they could impact sensitive meetings now being held virtually. During its investigation, the company's security researchers discovered three vulnerabilities in Webex.

If exploited, these flaws could allow a malicious actor to become a 'ghost' and join a meeting without being detected. They would be unable to be seen on the participant list while still have full access to video, audio, chat and screen-sharing capabilities.

To make matters worse, a ghost could remain in a Webex meeting even after being expelled from it while still maintaining an audio connection that would allow them to listen in on sensitive company business. Additionally, a ghost could gain access to information on meeting attendees including their full names, email address and IP addresses from the meeting room lobby even without being admitted to the call.

Webex vulnerabilities

The IBM Research team discovered three vulnerabilities in Cisco Webex, tracked as CVE-2020-3441, CVE-2020-3471 and CVE-2020-3419, while examining the platform for security and privacy implications for businesses. 

These flaws affect both scheduled meetings with unique meeting URLs and even Webex Personal Rooms. However, Personal Rooms may be easier to exploit because they are often based on a predictable combination of the room owner's name and the organization name.

Upon its discovery, IBM reported the vulnerabilities to Cisco and they have all now been patched. However, both companies have agreed to limited information dissemination regarding the flaws until all patches have been made available to reduce the risk to the industry as a whole.

To avoid falling victim to any potential attacks while video conferencing, IBM recommends that organizations test new collaboration tools for security, evaluate confident ail call policies, use unique meeting Ids, implement meeting passwords or PINs, start meetings with a roll call, turn on notifications, immediately end suspicious calls, lock meetings and restart meetings when holding back-to-back calls.

from TechRadar - All the latest technology news https://ift.tt/3lKLNFX



Apps,3855,Business,145,Camera,1154,Earn $$$,1,Gadgets,1739,Games,922,Mobile,1695,Technology,7932,Trailers,795,Travel,36,Trendly News,14335,Video,3,XIAOMI,12,
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Cisco Webex had some very spooky security flaws
Cisco Webex had some very spooky security flaws
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy