If at first you don't succeed, you may well be Cisco: WebEx patch needs its own patch

Updated Cisco will take a second crack at addressing a vulnerability in WebEx that can be exploited to execute malicious code on a vulnerable installation.

Switchzilla has issued a new fix to address CVE-2018-15442, a command injection bug in its video conference software that allows a local attacker to their elevate privileges, and then execute code by injecting commands through the software update component of the WebEx Meetings Client.

The bug was traced back to the failure by Webex Meetings to properly check arguments passed via its update service commands. Thus a miscreant could run an update command with specially crafted arguments to ultimately execute code with system privileges. This means rogue logged-in users or malware on a Windows system could leverage WebEx to completely hijack the machine.

Cisco had hoped to plug the vulnerability in October with a patch that was thought to have resolved the flaw. However, software-breakers at SecureAuth found that Switchzilla failed to account for DLL preloading.

By sticking the malicious commands inside a DLL file and then executing the update program with that library loaded, an attacker would be able to circumvent the patch and then exploit the flaw as before to execute commands with system-level clearance.

"The vulnerability can be exploited by copying to an a local attacker controller folder, the ptUpdate.exe binary. Also, a malicious dll must be placed in the same folder, named wbxtrace.dll," SecureAuth explained in its disclosure today.

"To gain privileges, the attacker must start the service with the command line:"

Fortunately, the flaw was privately disclosed to Cisco, giving the teleconferencing vendor time to get out a fix prior to this bug going public. Those running Webex Meetings on their Windows machines should update as soon as possible.

While the flaw isn't as severe as a remote code bug that could be exploited without any user interaction, the fact it has now been patched twice and has working proof-of-concept code public should make patching a priority. ®

Updated to add

"On November 27, 2018, Cisco updated a previously published security advisory that details a Webex Meetings App Update Service Command Injection Vulnerability affecting Windows systems," Cisco told The Reg in a statement.

"An additional attack method was reported to Cisco by security researchers, and the initial software fix for this vulnerability has been updated. Cisco is not aware of any malicious use of the vulnerability that is described in this advisory."

Software News

Apr 25
But is it enough to combat the Microsoft juggernaut?
Apr 25
Chromium base should ease porting pains substantially
Apr 25
Contender hopes to one day become the preferred Node.js Package Manager
Apr 25
Plenty of CPU goodness to spread around in the first big 2019 update
Apr 24
Aging awful art app to remain in May 2019 OS upgrade after its, wait for it, wait for it... brush with death
Apr 24
Qualtrics slurp and restructure aren't making any money yet
Apr 24
If you ever wanted to write an extension for Microsoft's long-dead media hub, you can