If at first you don't succeed, you may well be Cisco: WebEx patch needs its own patch
Switchzilla has a second go at fixing videoconferencing app's 'I'm the captain, now' hole
Updated Cisco will take a second crack at addressing a vulnerability in WebEx that can be exploited to execute malicious code on a vulnerable installation.
Switchzilla has issued a new fix to address CVE-2018-15442, a command injection bug in its video conference software that allows a local attacker to their elevate privileges, and then execute code by injecting commands through the software update component of the WebEx Meetings Client.
The bug was traced back to the failure by Webex Meetings to properly check arguments passed via its update service commands. Thus a miscreant could run an update command with specially crafted arguments to ultimately execute code with system privileges. This means rogue logged-in users or malware on a Windows system could leverage WebEx to completely hijack the machine.
Cisco had hoped to plug the vulnerability in October with a patch that was thought to have resolved the flaw. However, software-breakers at SecureAuth found that Switchzilla failed to account for DLL preloading.
By sticking the malicious commands inside a DLL file and then executing the update program with that library loaded, an attacker would be able to circumvent the patch and then exploit the flaw as before to execute commands with system-level clearance.
"The vulnerability can be exploited by copying to an a local attacker controller folder, the ptUpdate.exe binary. Also, a malicious dll must be placed in the same folder, named wbxtrace.dll," SecureAuth explained in its disclosure today.
"To gain privileges, the attacker must start the service with the command line:"
sc start webexservice install software-update 1 "attacker-controlled-path"
Fortunately, the flaw was privately disclosed to Cisco, giving the teleconferencing vendor time to get out a fix prior to this bug going public. Those running Webex Meetings on their Windows machines should update as soon as possible.
While the flaw isn't as severe as a remote code bug that could be exploited without any user interaction, the fact it has now been patched twice and has working proof-of-concept code public should make patching a priority. ®
Updated to add
"On November 27, 2018, Cisco updated a previously published security advisory that details a Webex Meetings App Update Service Command Injection Vulnerability affecting Windows systems," Cisco told The Reg in a statement.
"An additional attack method was reported to Cisco by security researchers, and the initial software fix for this vulnerability has been updated. Cisco is not aware of any malicious use of the vulnerability that is described in this advisory."
Sponsored: Becoming a Pragmatic Security Leader