Cisco Security Advisory 2024年07月05日
Cisco Webex Meetings Meeting Information and Metadata Issue June 2024
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

思科于2024年5月初发现Cisco Webex Meetings存在漏洞,可能被用于针对性安全研究活动,导致某些客户的Webex部署中会议信息和元数据被未经授权访问。这些漏洞已得到解决,修复程序已于2024年5月28日在全球范围内完全实施。思科已通知受此活动影响的客户。思科正在进行调查,并提供以下更新:思科相信,在2024年5月6日之前,参与针对性研究活动的同一行为者获取了更多会议数据。一小部分客户已通知思科,有人尝试使用在部署漏洞修复程序之前检索到的会议数据,通过公共交换电话网(PSTN)拨入会议。在成功的PSTN拨入中,行为者自称是为了支持安全研究。

🎯 思科于2024年5月初发现Cisco Webex Meetings存在漏洞,可能被用于针对性安全研究活动,导致某些客户的Webex部署中会议信息和元数据被未经授权访问。这些漏洞已得到解决,修复程序已于2024年5月28日在全球范围内完全实施。

🚨 思科相信,在2024年5月6日之前,参与针对性研究活动的同一行为者获取了更多会议数据。

📞 一小部分客户已通知思科,有人尝试使用在部署漏洞修复程序之前检索到的会议数据,通过公共交换电话网(PSTN)拨入会议。在成功的PSTN拨入中,行为者自称是为了支持安全研究。

🛡️ 思科建议客户验证其会议是否已启用密码,并启用虚拟大厅功能,以提高会议安全性。

⚠️ 客户应审查可能在漏洞修复程序于2024年5月28日在全球范围内完全实施之前获得的会议信息和元数据,并评估其部署的风险。

📣 思科将继续通过常规支持渠道发布进一步的沟通,并鼓励客户使用这些渠道提出进一步的问题。

🤝 思科欢迎与客户和安全社区合作,以增强整个行业的安全性。

In early May 2024, Cisco identified bugs in Cisco Webex Meetings that we now believe were leveraged in targeted security research activity allowing unauthorized access to meeting information and metadata in Cisco Webex deployments for certain customers. These bugs have been addressed and a fix has been fully implemented worldwide as of May 28, 2024. 

Cisco has notified those customers who we identified as being affected by this activity based on available access logs. Because we strive to retain access logs only as long as necessary to deliver the service and comply with applicable records retention requirements and data protection limits, our access logs are not retained indefinitely and are deleted on a rolling basis. Cisco does not have available access logs on the data set before May 6, 2024.

Since the bugs were patched, Cisco has not observed any further successful attempts to obtain new meeting data or metadata leveraging the bugs.

Our investigation is still ongoing, and Cisco is providing the following updates:

Cisco recommends that customers who have PSTN enabled for their scheduled meetings verify that they require passcodes for dial-in users. If not previously enabled, enabling a passcode will require the host to re-send the meeting invitation with the new passcode.

For customers who have Personal Meeting Rooms (PMR) configured, Cisco recommends that customers verify that their lobby feature is enabled and configured as recommended in our best practices guidance (see below). This will require unauthenticated and external meeting participants to wait in a virtual lobby unless and until the host directly admits them to the meeting.

Customers are advised to review meeting information and metadata that may have been obtained before the bug fix was fully implemented worldwide as of May 28, 2024, and assess the risk for their deployments.

Cisco Webex Meetings customers should continue to monitor regular support channels for further communication and are encouraged to use those channels for further questions. As always, Cisco will communicate through established channels.

Cisco welcomes the opportunity to engage with customers and the security community to enhance security across the industry.

For a detailed list of security capabilities for Personal Meeting Rooms, the PSTN dial-in option for Cisco Webex Meeting hosts, and Cisco Webex administrators, see Best practices for secure meetings: hosts and Webex best practices for secure meetings: Control Hub.

Obtaining Additional Support 
For general security and support concerns about Cisco products and cloud-hosted services, the Cisco Technical Assistance Center (TAC) can provide configuration and technical assistance. The Cisco TAC can also help with nonsensitive security incidents and software upgrades for security bug fixes. TAC Support Worldwide contact information.


Security Impact Rating: Informational

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

思科 Webex 会议 安全漏洞 安全研究
相关文章