{"id":164173,"date":"2024-06-05T13:37:06","date_gmt":"2024-06-05T13:37:06","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=164173"},"modified":"2024-06-05T13:46:37","modified_gmt":"2024-06-05T13:46:37","slug":"cisco-webex-flaws-german-government-meetings","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/164173\/breaking-news\/cisco-webex-flaws-german-government-meetings.html","title":{"rendered":"Cisco addressed Webex flaws used to compromise German government meetings"},"content":{"rendered":"
<\/div>\n

Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government.<\/h2>\n\n\n\n

In early May, German media outlet <\/gwmw>Zeit Online<\/a> revealed that threat actors exploited vulnerabilities in the German government\u2019s implementation of the Cisco Webex software to access internal meetings.  <\/gwmw><\/p>\n\n\n\n

In March, the German authorities admitted<\/strong><\/a> the hack by Russia-linked actors of a military meeting where participants discussed giving military support to Ukraine.<\/p>\n\n\n\n

“In early May 2024, Cisco identified bugs in Cisco Webex Meetings that we now believe were leveraged in targeted security research activity allowing unauthorized access to meeting information and metadata in Cisco Webex deployments for certain customers hosted in our Frankfurt data center.” reads the advisory<\/a> published by the company. <\/em><\/p>\n\n\n\n

Experts believe threat actors exploited an insecure direct object reference (IDOR) vulnerability to access internal Webex meetings. Threat actors gained access to information about the meeting, such as topics and participants, and spied on sensitive meetings, despite the German government decided to use an on-premises version of Webex.<\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n

The experts also discovered that some meeting rooms of high-ranking officials were not password-protected.<\/p>\n\n\n\n

The IT giant now confirmed that the vulnerability exploited by the nation-state actors has been addressed.<\/p>\n\n\n\n

“These bugs have been addressed and a fix has been fully implemented worldwide as of May 28, 2024.” continues the advisory.<\/em><\/p>\n\n\n\n

Cisco notified customers who experienced observable attempts to access meeting information and metadata. Since the flaws were addressed, the company hasn’t observed any other attempts to exploit the vulnerabilities. The company added that the investigation is still ongoing and that they continuing to monitor for unauthorized activity, providing updates as needed through regular channels.<\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0Germany<\/a>)<\/strong><\/gwmw><\/gwmw><\/p>\n\n\n\n

<\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government. In early May, German media outlet Zeit Online revealed that threat actors exploited vulnerabilities in the German government\u2019s implementation of the Cisco Webex software to access internal meetings.   In March, the German authorities admitted the hack by Russia-linked actors of […]<\/p>\n","protected":false},"author":1,"featured_media":36957,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,5,6],"tags":[1671,295,4112,9508,9506,10918,687,841,1533,6209],"class_list":["post-164173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-hacking","category-intelligence","tag-cisco","tag-cyberespionage","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-pierluigi-paganini","tag-security-affairs","tag-security-news","tag-webex"],"yoast_head":"\n杭州江阴科强工业胶带有限公司