CVE-2017-3823
CVSS V2 High 9.3
CVSS V3 High 8.8
Description
An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser.
Overview
- CVE ID
- CVE-2017-3823
- Assigner
- ykramarz@cisco.com
- Vulnerability Status
- Modified
- Published Version
- 2017-02-01T11:59:00
- Last Modified Date
- 2017-10-10T01:30:22
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cisco:activetouch_general_plugin_container:105:*:*:*:*:firefox:*:* | 1 | OR | ||
cpe:2.3:a:cisco:download_manager:2.1.0.9:*:*:*:*:internet_explorer:*:* | 1 | OR | ||
cpe:2.3:a:cisco:gpccontainer_class:*:*:*:*:*:internet_explorer:*:* | 1 | OR | 10031.6.2017.0125 | |
cpe:2.3:a:cisco:webex:*:*:*:*:*:chrome:*:* | 1 | OR | 1.0.6 | |
cpe:2.3:a:cisco:webex_meetings_server:2.0_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr8:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:p2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.0_mr9:p3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr2:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr5:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:p2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.5_mr6:p3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_mr1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_mr1:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_mr2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_mr2:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_mr3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.6_mr3:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.7_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.7_mr1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.7_mr1:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meetings_server:2.7_mr2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_mr1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_mr1:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_mr2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_mr2:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_mr3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.6_mr3:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.7_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.7_mr1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.7_mr1:p1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:2.7_mr2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:t29_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:t30_base:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:webex_meeting_center:t31_base:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 9.3
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 10
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170124-webex | Vendor Advisory |
http://www.securityfocus.com/bid/95737 | Third Party Advisory VDB Entry |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1096 | Technical Description Third Party Advisory |
https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html | |
http://www.securitytracker.com/id/1037680 | |
https://www.kb.cert.org/vuls/id/909240 | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1100 | |
https://blog.filippo.io/webex-extension-vulnerability/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2017-3823 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3823 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 08:15:32 | Added to TrackCVE | |||
2022-12-02 13:29:23 | psirt@cisco.com | ykramarz@cisco.com | CVE Assigner | updated |
2022-12-02 13:29:23 | 2017-02-01T11:59Z | 2017-02-01T11:59:00 | CVE Published Date | updated |
2022-12-02 13:29:23 | 2017-10-10T01:30:22 | CVE Modified Date | updated | |
2022-12-02 13:29:23 | Modified | Vulnerability Status | updated |