cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
475
Views
5
Helpful
1
Replies

Security Vulnerability in WebEx

mjw913
Level 1
Level 1

Security scans have found a vulnerability in WebEx.  It uses a program log4net.dll that is outdated.  This has vulnerabilities described in https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1285

 

Any fixes?

1 Accepted Solution

Cole Callahan
Cisco Employee
Cisco Employee

Hi @mjw913 ,

Thanks for posting here in the community. The Cisco Product Security Incident Response Team (PSIRT) is responsible for responding to Cisco product security incidents. The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Cisco products and networks. Cisco defines a security vulnerability as an unintended weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of the product. The Cisco PSIRT adheres to ISO/IEC 29147:2014.

 

These forums are NOT monitored by the Cisco PSIRT – however, you can contact them by using any of the mechanisms listed at https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#roosfassv



Response Signature


View solution in original post

1 Reply 1

Cole Callahan
Cisco Employee
Cisco Employee

Hi @mjw913 ,

Thanks for posting here in the community. The Cisco Product Security Incident Response Team (PSIRT) is responsible for responding to Cisco product security incidents. The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Cisco products and networks. Cisco defines a security vulnerability as an unintended weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of the product. The Cisco PSIRT adheres to ISO/IEC 29147:2014.

 

These forums are NOT monitored by the Cisco PSIRT – however, you can contact them by using any of the mechanisms listed at https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#roosfassv



Response Signature