5.3
CVE-2020-3441
- EPSS 0.86%
- Published 18.11.2020 19:15:12
- Last modified 21.11.2024 05:31:04
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to view sensitive information from the meeting room lobby. This vulnerability is due to insufficient protection of sensitive participant information. An attacker could exploit this vulnerability by browsing the Webex roster. A successful exploit could allow the attacker to gather information about other Webex participants, such as email address and IP address, while waiting in the lobby.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Webex Meetings SwEditionslow_channel Version <= 40.6.11
Cisco ≫ Webex Meetings Version <= 40.11.3
Cisco ≫ Webex Meetings Server Version < 3.0
Cisco ≫ Webex Meetings Server Version3.0 Updatemaintenance_release2
Cisco ≫ Webex Meetings Server Version3.0 Updatemaintenance_release3
Cisco ≫ Webex Meetings Server Version4.0 Update-
Cisco ≫ Webex Meetings Server Version4.0 Updatemaintenance_release1
Cisco ≫ Webex Meetings Server Version4.0 Updatemaintenance_release2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.86% | 0.73 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
psirt@cisco.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.