CVE-2024-20396

5.3 MEDIUM

📋 TL;DR

A vulnerability in Cisco Webex App's protocol handlers could allow remote attackers to capture sensitive information like credentials by tricking users into clicking malicious links. This affects all users of vulnerable Cisco Webex App versions. Attackers need to be in a privileged network position to observe the transmitted traffic.

💻 Affected Systems

Products:
  • Cisco Webex App
Versions: Versions earlier than 44.6.0
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability is in the application's protocol handler implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture user credentials and other sensitive data transmitted through Webex App, leading to account compromise and potential lateral movement.

🟠

Likely Case

Attackers capture session tokens or other sensitive information that could be used for limited unauthorized access.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated incidents with quick detection.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (clicking a link) and attacker network positioning to intercept traffic. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 44.6.0 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j

Restart Required: Yes

Instructions:

1. Open Cisco Webex App. 2. Go to Settings > About. 3. Check current version. 4. If below 44.6.0, update through the app's update mechanism or download from Cisco's website. 5. Restart the application after update.

🔧 Temporary Workarounds

Disable automatic protocol handling

all

Prevent Webex App from automatically handling certain protocol links that could be exploited.

Manual configuration through Webex App settings > General > uncheck 'Register Webex as default for meetings' and similar protocol handlers

🧯 If You Can't Patch

  • Implement network segmentation to limit attacker ability to intercept traffic in privileged positions
  • Deploy web proxy filtering to block malicious links and monitor for suspicious protocol handler requests

🔍 How to Verify

Check if Vulnerable:

Check Webex App version in Settings > About. If version is below 44.6.0, the system is vulnerable.

Check Version:

On Windows: Check 'About' in Webex App GUI. On macOS: Webex App > About Webex from menu bar.

Verify Fix Applied:

Verify version is 44.6.0 or higher in Settings > About after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual protocol handler activation events in application logs
  • Multiple failed authentication attempts following protocol handler usage

Network Indicators:

  • Unusual outbound traffic patterns from Webex App to unexpected destinations
  • Protocol handler requests to non-Cisco domains

SIEM Query:

source="webex_app" AND (event_type="protocol_handler" OR url="file://*")

🔗 References

📤 Share & Export