CVE-2024-20396

moderate-risk
Published 2024-07-17

A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests.

Do I need to act?

-
0.89% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10 Medium
NETWORK / HIGH complexity

Affected Products (20)

Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams
Webex Teams

Affected Vendors

45
/ 100
moderate-risk
Severity 17/34 · Moderate
Exploitability 3/34 · Minimal
Exposure 25/34 · High