Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2021-1221

CVE information

Published

3 years ago

Last Modified

5 months ago

CVSSv2.0 Severity

Low

CVSSv3.1 Severity

Medium

Impact Analysis

Description

A vulnerability in the user interface of Cisco Webex Meetings and Cisco Webex Meetings Server Software could allow an authenticated, remote attacker to inject a hyperlink into a meeting invitation email. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by entering a URL into a field in the user interface. A successful exploit could allow the attacker to generate a Webex Meetings invitation email that contains a link to a destination of their choosing. Because this email is sent from a trusted source, the recipient may be more likely to click the link..

CVSSv2.0 Score

Severity
Low
Base Score
3.5/10
Exploit Score
6.8/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
Single
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
None
Integrity Impact
Partial

CVSSv3.1 Score

Severity
Medium
Base Score
4.1/10
Exploit Score
2.3/10
Access Vector
Network
Access Complexity
Low
Privileges Required
Low
Impact Score
1.4/10
Confidentiality Impact
None
Availability Impact
None
Integrity Impact
Low
Scope
Changed
User Interaction
Required

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*
  Yes
- 3.0
cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_releas
  Yes
- -
cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:*:*:*
  Yes
- 41.1.0
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_releas
  Yes
- -