Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This threat report is about a Cisco Webex Meetings Desktop App vulnerability referred to as CVE-2020-3263. Because of its high severity impact, CVE-2020-3263 has been given a 7.5 base CVSS Score.
The exploitation of this vulnerability could allow a remote unauthenticated attacker to execute programs on an end user's system. Cisco has released software updates to remediate this vulnerability in the affected product versions, and the link is provided at the end of this threat report.
This vulnerability is caused by improper input validation supplied to application URLs in Cisco Webex Meetings Desktop App versions 39.5.12 and prior. When software does not validate input properly, the control flow and data flow of the program can be affected.
If an attacker successfully gains initial access to a vulnerable system, they could use this weakness to manipulate the input the application receives. Improper Input Validation is a common weakness referred to as CWE-20.
An attacker could exploit CVE-2020-3263 by persuading a user to follow a malicious URL. Successful exploitation could allow the attacker to influence the application to run programs already present on the machine. If any malicious files have been planted on the host or on an accessible network file path, the attacker could execute arbitrary code on the system.
The exploitation of this vulnerability could have a critical impact on an organization since it could lead to arbitrary code execution and resource control. If a device is successfully compromised, it could lead to additional hosts being affected on the network.
Avertium highly recommends you verify all devices running Cisco Webex Meetings Desktop App have installed the latest update to remediate this vulnerability. See below for more information and the CVE-2020-3263 update link.
Cisco Security Advisory (Update information): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-url-fcmpdfVY
IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/183595
CVE-2020-3263: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3263
CWE-20: (Improper Input Validation): http://cwe.mitre.org/data/definitions/20.html
NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-3263
MITRE Mapping(s):
Note: The Avertium Threat Report analyzes one current threat that has been shared by threat intelligence networks across the globe. Used internally by the Avertium CyberOps Team, this report will outline a “top-of-mind” threat and how it ought to be addressed accordingly.
This informed analysis is based on the latest data available at the time of publication.
Contact us for more information about Avertium’s managed security service capabilities.
Deciding between running an in-house SOC vs. using managed security services (MSS) to add more rigor, more relevance, and more responsiveness to your cybersecurity program? Compare the two options. Download the e-book!