A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.
Published 2018-10-24 19:29:00
Updated 2019-10-09 23:35:38
View at NVD,   CVE.org

Products affected by CVE-2018-15442

Exploit prediction scoring system (EPSS) score for CVE-2018-15442

56.50%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2018-15442

  • WebExec Authenticated User Code Execution
    Disclosure Date: 2018-10-24
    First seen: 2020-04-26
    exploit/windows/smb/webexec
    This module uses a valid username and password of any level (or password hash) to execute an arbitrary payload. This module is similar to the "psexec" module, except allows any non-guest account by default. Authors: - Ron <ron@skullsecurity.net>
  • WebEx Local Service Permissions Exploit
    Disclosure Date: 2018-10-09
    First seen: 2020-04-26
    exploit/windows/local/webexec
    This module exploits a flaw in the 'webexservice' Windows service, which runs as SYSTEM, can be used to run arbitrary commands locally, and can be started by limited users in default installations. Authors: - Jeff McJunkin <jeff.mcjunkin@gmail.com>
  • WebEx Remote Command Execution Utility
    First seen: 2020-04-26
    auxiliary/admin/smb/webexec_command
    This module enables the execution of a single command as System by exploiting a remote code execution vulnerability in Cisco's WebEx client software. Authors: - Ron Bowes <ron@skullsecurity.net>

CVSS scores for CVE-2018-15442

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.2
HIGH AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
NIST
7.8
HIGH CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.8
5.9
NIST
7.8
HIGH CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.8
5.9
Cisco Systems, Inc.

CWE ids for CVE-2018-15442

References for CVE-2018-15442

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!