A vulnerability in virtualization channel messaging in Cisco Webex Meetings Desktop App for Windows could allow a local attacker to execute arbitrary code on a targeted system. This vulnerability occurs when this app is deployed in a virtual desktop environment and using virtual environment optimization. This vulnerability is due to improper validation of messages processed by the Cisco Webex Meetings Desktop App. A local attacker with limited privileges could exploit this vulnerability by sending malicious messages to the affected software by using the virtualization channel interface. A successful exploit could allow the attacker to modify the underlying operating system configuration, which could allow the attacker to execute arbitrary code with the privileges of a targeted user. Note: This vulnerability can be exploited only when Cisco Webex Meetings Desktop App is in a virtual desktop environment on a hosted virtual desktop (HVD) and is configured to use the Cisco Webex Meetings virtual desktop plug-in for thin clients.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2020-11-06T18:16:48.357499Z
Updated: 2024-11-13T17:42:34.777Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3588
Vulnrichment
Updated: 2024-08-04T07:37:55.690Z
NVD
Status : Modified
Published: 2020-11-06T19:15:15.110
Modified: 2023-11-07T03:22:58.017
Link: CVE-2020-3588
Redhat
No data.