- Cisco warns new vulnerability in Webex for Broadworks
- The defect allowed the threat actors to steal sensitive remote files
- A fix has already been deployed and users must be updated immediately
Cisco warned Webex for Broadworks users of a vulnerability that could allow threat actors to remotely access sensitive data.
Cisco Webex for Broadworks is a Cloud collaboration solution that incorporates the videoconferencing tool with BroadWorks -based service providers, offering messaging, call and meeting for companies.
In a security notice published on the Cisco website, the company said that it had discovered a vulnerability with low severity in version 45.2 of the application, which allowed malicious actors to access sensitive data if unsecured transport is configured for SIP communication.
Exploit the flaw
“This vulnerability is due to the exposure of sensitive information in SIP headers,” said Cisco.
He also added that he had discovered a related problem that could allow an unauthenticated user to access identification information in gross text, in the customer and server newspapers.
“A malicious actor could use this vulnerability and the related problem to access data and identification information and pretend to be the user,” warned Cisco.
Since the company has already made a configuration change which will resolve both vulnerability and the related problem, users are recommended to restart their Cisco Webex applications to apply the modifications. For those who prefer to deploy a bypass solution, Cisco said that administrators could configure secure transport for SIP communication to encrypt transit data.
“Cisco also recommends rotation skills securities to protect itself against the possibility that identification information has been acquired by a malicious actor,” concludes the opinion. Until now, there has been no evidence that vulnerability has been abused in nature.
In early February 2025, Cisco published fixes for two vulnerabilities of critical severity afflicting its identity service engine solution (ISE). The two could have been used to execute arbitrary orders and steal sensitive information.
Since the fix has already been deployed, he advised his customers to restart the application to apply configuration changes.
Via Bleeping Compompute