ID

VAR-202009-1173


CVE

CVE-2020-3542


TITLE

Cisco Webex Training Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202009-112

DESCRIPTION

A vulnerability in Cisco Webex Training could allow an authenticated, remote attacker to join a password-protected meeting without providing the meeting password. The vulnerability is due to improper validation of input to API requests that are a part of meeting join flow. An attacker could exploit this vulnerability by sending an API request to the application, which would return a URL that includes a meeting join page that is prepopulated with the meeting username and password. A successful exploit could allow the attacker to join the password-protected meeting. The attacker would be visible in the attendee list of the meeting

Trust: 0.99

sources: NVD: CVE-2020-3542 // VULHUB: VHN-181667

AFFECTED PRODUCTS

vendor:ciscomodel:webex trainingscope:ltversion:40.7.6

Trust: 1.0

sources: NVD: CVE-2020-3542

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3542
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3542
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202009-112
value: MEDIUM

Trust: 0.6

VULHUB: VHN-181667
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3542
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-181667
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3542
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-181667 // CNNVD: CNNVD-202009-112 // NVD: CVE-2020-3542 // NVD: CVE-2020-3542

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-181667 // NVD: CVE-2020-3542

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202009-112

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202009-112

EXTERNAL IDS

db:NVDid:CVE-2020-3542

Trust: 1.7

db:CNNVDid:CNNVD-202009-112

Trust: 0.7

db:AUSCERTid:ESB-2020.3027

Trust: 0.6

db:CNVDid:CNVD-2020-51774

Trust: 0.1

db:VULHUBid:VHN-181667

Trust: 0.1

sources: VULHUB: VHN-181667 // CNNVD: CNNVD-202009-112 // NVD: CVE-2020-3542

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-webex-meetings-utbwor4q

Trust: 2.3

url:https://www.auscert.org.au/bulletins/esb-2020.3027/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-3542

Trust: 0.6

sources: VULHUB: VHN-181667 // CNNVD: CNNVD-202009-112 // NVD: CVE-2020-3542

SOURCES

db:VULHUBid:VHN-181667
db:CNNVDid:CNNVD-202009-112
db:NVDid:CVE-2020-3542

LAST UPDATE DATE

2024-11-23T22:21:02.213000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181667date:2021-10-19T00:00:00
db:CNNVDid:CNNVD-202009-112date:2021-01-05T00:00:00
db:NVDid:CVE-2020-3542date:2024-11-21T05:31:16.720

SOURCES RELEASE DATE

db:VULHUBid:VHN-181667date:2020-09-04T00:00:00
db:CNNVDid:CNNVD-202009-112date:2020-09-02T00:00:00
db:NVDid:CVE-2020-3542date:2020-09-04T03:15:10.950