
Cisco mitigated vulnerabilities utilized to breach the security of German government Webex meetings.
Early in the month of May, Zeit Online reported that cybercriminals exploited weaknesses in the German government’s configuration of Cisco Webex software to gain unauthorized access to internal meetings.
Back in March, the German government acknowledged the intrusion by Russian-linked entities during a military meeting centered on providing military support to Ukraine.
“In the beginning of May 2024, Cisco identified vulnerabilities in Cisco Webex Meetings that were potentially utilized in targeted security exploration activities, allowing unauthorized entry to meeting data and metadata in Cisco Webex configurations for specific clients hosted in our Frankfurt data hub,” stated the advisory released by Cisco.
Experts speculate that cybercriminals exploited an insecure direct object reference (IDOR) flaw to infiltrate internal Webex meetings, enabling them to access meeting information, such as participants and subject matter, and eavesdrop on sensitive discussions despite the German government opting for an on-premises version of Webex.
It was also uncovered that certain meeting rooms utilized by high-ranking officials lacked password protection.
Cisco has now confirmed that the security flaw abused by state-affiliated actors has been remedied.
“These vulnerabilities have been rectified and a comprehensive solution has been globally enacted as of May 28, 2024,” the advisory continued.
Cisco informed affected customers about any noticeable attempts to infiltrate meeting information and metadata. Following the resolution of the vulnerabilities, there have been no further observed exploitation attempts. The company mentioned that the investigation is ongoing, with continuous monitoring for unauthorized activities and necessary updates provided through standard communication channels.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Germany)
