CVE-2018-0422 (CNNVD-201809-255)

HIGH
中文标题:
Cisco Webex Meetings client for Windows 权限许可和访问控制问题漏洞
英文标题:
A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an ...
CVSS分数: 7.3
发布时间: 2018-10-05 14:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Webex Meetings Suite等都是美国思科(Cisco)公司的多功能视频会议解决方案。Webex Meetings client for Windows是一个基于Windows平台的视频会议客户端软件。 基于Windows平台的Cisco Webex Meetings client中的文件夹权限存在权限许可和访问控制漏洞,该漏洞源于程序授予用户读取,写入和执行Webex文件夹中的文件的权限。本地攻击者可利用该漏洞修改本地存储的文件并在目标设备上执行代码。以下产品受到影响:Cisco Webex Meetings Suite (WBS31);Cisco Webex Meetings Suite (WBS32);Cisco Webex Meetings Suite (WBS33);Cisco Webex Meetings;Cisco Webex Meetings Server。

英文描述:

A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user. The vulnerability is due to folder permissions that grant a user the permission to read, write, and execute files in the Webex folders. An attacker could exploit this vulnerability to write malicious files to the Webex client directory, affecting all other users of the targeted device. A successful exploit could allow a user to execute commands with elevated privileges. Attacks on single-user systems are less likely to occur, as the attack must be carried out by the user on the user's own system. Multiuser systems have a higher risk of exploitation because folder permissions have an impact on all users of the device. For an attacker to exploit this vulnerability successfully, a second user must execute the locally installed malicious file to allow remote code execution to occur.

CWE类型:
CWE-732
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco webex_meetings_online * - - cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*
cisco webex_meetings_online t31.20 - - cpe:2.3:a:cisco:webex_meetings_online:t31.20:*:*:*:*:*:*:*
cisco webex_meetings_online t31.20.2 - - cpe:2.3:a:cisco:webex_meetings_online:t31.20.2:*:*:*:*:*:*:*
cisco webex_meetings_server * - - cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*
cisco webex_meetings_server 3.0 - - cpe:2.3:a:cisco:webex_meetings_server:3.0:mr1:*:*:*:*:*:*
cisco webex_business_suite_32 * - - cpe:2.3:a:cisco:webex_business_suite_32:*:*:*:*:*:*:*:*
cisco webex_business_suite_33 * - - cpe:2.3:a:cisco:webex_business_suite_33:*:*:*:*:*:*:*:*
cisco webex_business_suite_31 * - - cpe:2.3:a:cisco:webex_business_suite_31:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
105281 vdb-entry
cve.org
访问
1041681 vdb-entry
cve.org
访问
20180905 Cisco Webex Meetings Client for Windows Privilege Escalation Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
7.3
HIGH
CVSS向量: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS版本: 3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2018-10-05 14:00:00
修改时间:
2024-11-26 14:45:46
创建时间:
2025-11-11 15:34:57
更新时间:
2025-11-11 15:53:56
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0422 2025-11-11 15:19:35 2025-11-11 07:34:57
NVD nvd_CVE-2018-0422 2025-11-11 14:55:59 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201809-255 2025-11-11 15:10:04 2025-11-11 07:53:56
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:56
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201809-255; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201809-255
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.3; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 8; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.3
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 8
  • data_sources: ['cve'] -> ['cve', 'nvd']