CVE-2021-1242Multiple Interpretations of UI Input in Cisco Webex Teams

Severity
4.3MEDIUMNVD
EPSS
0.4%
top 40.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateJul 11

Description

A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

NVDcisco/webex_teams< 40.12.0.17293

🔴Vulnerability Details

4
OSV
apport vulnerabilities2024-07-11
GHSA
GHSA-w44v-8fr4-v7gw: A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface2022-05-24
OSV
apport vulnerabilities2022-05-17
CVEList
Cisco Webex Teams Shared File Manipulation Vulnerability2021-01-13

📋Vendor Advisories

1
Cisco
Cisco Jabber and Webex Client Software Shared File Manipulation Vulnerability2021-01-13
CVE-2021-1242 — Multiple Interpretations of UI Input | cvebase