Cisco fixes WebEx flaw after government comms exposed (2024)

Cisco squashed some bugs this week that allowed anyone to view WebEx meeting information and join them, potentially opening up security and privacy concerns for highly sensitive meets.

The issues first came to light on May 4 when German news outlet Zeit Online published an investigation into the issues which saw it able to view the meeting details of circa 10,000 Dutch government confernece calls.

The bugs allowed onlookers to find meeting details such as where and when they were being held, the host's identity, duration, attendees, and its agenda. Dutch housing minister Hugo de Jonge's whereabouts were visible via the meeting metadata, and in other cases secretary of state Alexandra van Huffelen and Dilan Yeşilgöz, leader of the People's Party for Freedom and Democracy, were also exposed.

Officials in Germany could theoretically have also been compromised to a greater extent than those in the Netherlands, given that the government, at least in some cases, doesn't password-protect its WebEx confabs, according to cybersecurity expert Inge Bryan speaking to Dutch broadcaster NPO.

The investigators, who received links to thousands of meetings hosted by the German armed forces (Bundeswehr) from Netzbegrünung, the German association for green web culture, were able to drop into the assembly gatherings held by the Social Democratic Party of Germany via phone, for example, all while remaining undetected.

While not explicitly linked to this research, it wouldn't be a stretch to assume that the Russian leak of Bundeswehr calls in March was due to the bug in question.

The method would be more effective when meetings are more heavily populated. Unidentified participants connecting via phone are much easier to detect when meetings are small.

While there's no hard evidence to suggest that the flaws were actually abused by a hostile power, it remains a possibility and the Dutch government has launched an investigation as a result.

Reporters were told it would be difficult to determine whether meetings and been spied on because the logs for them don't date back very far.

Zeit's Eva Wolfangel explained to NPO [English subtitles] that because WebEx has a single phone number dedicated to joining meetings via phone in each country, all an intruder would have to do is call that number and input the meeting ID to join surreptitiously. That's if it wasn't password-protected, of course.

Joining WebEx meetings via video is password-protected by default, but it wasn't always the case when joining by phone, the investigation revealed.

Potential intruders just had to adjust the numbers in meeting URLs to read information about or gain access to others. The URLs contained sequences of numbers that could be cycled just by counting up and down, rather than them being randomly generated each time.

Using this method, the researchers were able to discover that the German Federal Office for Information Security (BSI) had held multiple meetings with the likes of Europol to discuss foreign espionage. The state capital of Munich is another big WebEx customer in Germany, and investigators were able to suss out that the head of its IT department called a meeting with her staff every Monday morning at the same time.

The private sector was also affected. Various companies across Europe, including those in the defense, tech, and chemical sectors were exposed through the WebEx bugs.

Cisco drops fixes

Cisco said on June 4 that the bugs were patched on May 28 and that customers who had their meetings compromised have been made aware, based on the logs available to it.

"In early May 2024, Cisco identified bugs in Cisco Webex Meetings that we now believe were leveraged in targeted security research activity allowing unauthorized access to meeting information and metadata in Cisco Webex deployments for certain customers," it said. "These bugs have been addressed and a fix has been fully implemented worldwide as of May 28, 2024.

  • Venerable ICQ messaging service to end operations in June
  • German defense chat overheard by Russian eavesdroppers on Cisco's WebEx
  • Verizon to 'sunset' Blue Jeans vidconf platform
  • Buckle up for meetings on the road as Cisco brings Webex to Audi autos

"Cisco has notified those customers who had observable successful attempts to access meeting information and metadata based on available logs. Since the bugs were patched, Cisco has not observed any further attempts to obtain meeting data or metadata leveraging the bugs.

"Our investigation is ongoing, and we continue to monitor for unauthorized activity. We will provide updates, if necessary, through regular channels."

El Reg requested additional information from Cisco and the government of the Netherlands but received no response.

The German BSI, however, offered the following statement: "Cisco Solutions GmbH has comprehensively informed the authorities it knows to be affected about their respective impact. This also included the complete list of affected Webex sessions of the respective authorities. In this context, the BSI was also informed of its own involvement. In addition, there were several incident reports from affected authorities to the BSI.

"Vulnerabilities in software products can occur and do not in themselves provide a basis for a fundamental statement about the IT security level of a product. The BSI minimum standard on video conferencing services provides information on how video conferencing services can generally be used securely for (general) communication regardless of acute vulnerabilities.

"In this specific case, Cisco has closed the exploited vulnerability. The BSI has recently sensitized its target groups to the secure use of video conferencing following such incidents and has drawn attention to corresponding BSI publications. The existing BSI recommendations are currently being reviewed and amended if necessary." ®

Cisco fixes WebEx flaw after government comms exposed (2024)

FAQs

Cisco fixes WebEx flaw after government comms exposed? ›

"These bugs have been addressed and a fix has been fully implemented worldwide as of May 28, 2024. "Cisco has notified those customers who had observable successful attempts to access meeting information and metadata based on available logs.

What are the security issues with Webex? ›

CVE-2023-20132. Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.

Is Webex by Cisco safe? ›

When you use Webex, all your communications occurs over strongly encrypted channels. Message and share files securely with required user verification to ensure the highest level of privacy. Your data will be safe at-rest until a user deletes it or per your policy.

Why is my Webex not working? ›

If you are using Webex App for iPhone, iPad, or Android, try switching to your mobile data connection. If the app works when you're connected to mobile data, then the Wi-Fi connection might be blocking Webex App traffic. If you're using Webex App at work, report this issue to your administrator.

Is Webex being discontinued? ›

On March 31st of 2023, Webex will discontinue their Webex Meetings application. This is being done to promote migration to their newer application, Webex (formerly Webex Teams). Users may transition to the Webex application at any time.

Does Cisco still own Webex? ›

All Webex products are part of the Cisco Systems collaboration portfolio.

Does anyone still use Webex? ›

As more organizations embrace remote working and learning, the need for reliable video conferencing solutions has skyrocketed. If you're exploring virtual meeting platforms, you'll find that Webex by Cisco and Zoom are among the most popular video conferencing services on the market today.

Which is better Cisco Webex or zoom? ›

Based on consumer feedback, Zoom is more user-friendly as compared to Webex. Zoom allows users to instantly join an online video conference or meeting, with common features across all devices. So, no matter what device you're using, you'll always be able to enjoy all its great features.

Why is Webex crashing? ›

This article covers basic troubleshooting steps for Webex Meeting Application and data to gather before contacting support. Meeting application randomly Freezes or Crashes. Cause: This issue may occur due to high resource consumption. For example, Excessive usage of Ram/Processor causes the machine to freeze or crash.

How do I report a problem to Webex? ›

Click your profile picture, then select Help > Report an issue. In the pop-up window, choose a Product area and Issue type, from the drop-down lists.

How do I clear the cache in Webex? ›

Under the Apps tab, select Cisco Webex Service, then click on the End Task button. Right-click on the Windows (Start) button, and select Run. In the Open text box, enter %USERPROFILE%\AppData\Local\WebEx\wbxcache. Delete all data in the wbxcache folder.

Is Webex safer than zoom? ›

Both Webex and Zoom offer solutions that are highly secure and reliable. Features such as encryption and user authentication optimize the security of both video conferencing platforms. What's more, both offer security control when it comes to desktop sharing. Both encrypt meetings, transmission and storage.

What are the security standards of Webex? ›

Levels of encryption security

The Webex App app encrypts messages, files, and names of spaces on your device before sending them to the cloud. When the data arrives at our servers, it's already encrypted. It's processed and stored until it's decrypted on your device.

Is Webex more secure than teams? ›

According to the National Security Agency (NSA), Webex is the most secure team collaboration app it recognizes.

How do I secure Webex? ›

Go to the Webex Meetings section, and check Enforce meeting password when joining by phone. This setting also applies to Webex Webinars. Go to the Webex Meetings section, and check Enforce meeting password when joining by video conferencing systems. This setting also applies to Webex Webinars.

References

Top Articles
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5880

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.