Cisco has patched several troubling security vulnerabilities in its Webex (opens in new tab) video conferencing service.
The flaws in the video conferencing software (opens in new tab) were flagged by IBM, a Webex customer. The company's IBM Research division and IBM's Office of the CISO took a deeper look at the collaboration tools (opens in new tab) being used for day-to-day work to better understand how they could impact sensitive meetings now being held virtually. During its investigation, the company's security researchers discovered three vulnerabilities in Webex.
If exploited, these flaws could allow a malicious actor to become a 'ghost' and join a meeting without being detected. They would be unable to be seen on the participant list while still have full access to video, audio, chat and screen-sharing capabilities.
- We've put together a list of the best collaboration software (opens in new tab) around
- These are the best business webcams (opens in new tab) for working from home
- Also check out our roundup of the best endpoint protection (opens in new tab)
To make matters worse, a ghost could remain in a Webex meeting even after being expelled from it while still maintaining an audio connection that would allow them to listen in on sensitive company business. Additionally, a ghost could gain access to information on meeting attendees including their full names, email address and IP addresses from the meeting room lobby even without being admitted to the call.
The IBM Research team discovered three vulnerabilities in Cisco Webex, tracked as CVE-2020-3441 (opens in new tab), CVE-2020-3471 (opens in new tab) and CVE-2020-3419 (opens in new tab), while examining the platform for security and privacy implications for businesses.
These flaws affect both scheduled meetings with unique meeting URLs and even Webex Personal Rooms. However, Personal Rooms may be easier to exploit because they are often based on a predictable combination of the room owner's name and the organization name.
Upon its discovery, IBM reported the vulnerabilities to Cisco and they have all now been patched. However, both companies have agreed to limited information dissemination regarding the flaws until all patches have been made available to reduce the risk to the industry as a whole.
To avoid falling victim to any potential attacks while video conferencing, IBM recommends that organizations test new collaboration tools for security, evaluate confident ail call policies, use unique meeting Ids, implement meeting passwords or PINs, start meetings with a roll call, turn on notifications, immediately end suspicious calls, lock meetings and restart meetings when holding back-to-back calls.
- We've also highlighted the best video conferencing software (opens in new tab)