Skip to main content

Webex fixed some seriously spooky security flaws

Webex
(Image credit: Cisco)
Audio player loading…

Cisco has patched several troubling security vulnerabilities in its Webex (opens in new tab) video conferencing service.

The flaws in the video conferencing software (opens in new tab) were flagged by IBM, a Webex customer. The company's IBM Research division and IBM's Office of the CISO took a deeper look at the collaboration tools (opens in new tab) being used for day-to-day work to better understand how they could impact sensitive meetings now being held virtually. During its investigation, the company's security researchers discovered three vulnerabilities in Webex.

If exploited, these flaws could allow a malicious actor to become a 'ghost' and join a meeting without being detected. They would be unable to be seen on the participant list while still have full access to video, audio, chat and screen-sharing capabilities.

To make matters worse, a ghost could remain in a Webex meeting even after being expelled from it while still maintaining an audio connection that would allow them to listen in on sensitive company business. Additionally, a ghost could gain access to information on meeting attendees including their full names, email address and IP addresses from the meeting room lobby even without being admitted to the call.

Webex vulnerabilities

The IBM Research team discovered three vulnerabilities in Cisco Webex, tracked as CVE-2020-3441 (opens in new tab), CVE-2020-3471 (opens in new tab) and CVE-2020-3419 (opens in new tab), while examining the platform for security and privacy implications for businesses. 

These flaws affect both scheduled meetings with unique meeting URLs and even Webex Personal Rooms. However, Personal Rooms may be easier to exploit because they are often based on a predictable combination of the room owner's name and the organization name.

Upon its discovery, IBM reported the vulnerabilities to Cisco and they have all now been patched. However, both companies have agreed to limited information dissemination regarding the flaws until all patches have been made available to reduce the risk to the industry as a whole.

To avoid falling victim to any potential attacks while video conferencing, IBM recommends that organizations test new collaboration tools for security, evaluate confident ail call policies, use unique meeting Ids, implement meeting passwords or PINs, start meetings with a roll call, turn on notifications, immediately end suspicious calls, lock meetings and restart meetings when holding back-to-back calls.

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.