A recently discovered vulnerability in Cisco Webex for BroadWorks could expose user credentials, potentially allowing attackers to impersonate users. While Cisco has released an update, affected users are urged to restart the app and change their credentials to safeguard their accounts.
🔍 What’s the Issue?
Cisco Webex for BroadWorks facilitates seamless calling and communication. However, a security flaw arises when the software is set to ‘unsecure transport’ for SIP (Session Initiation Protocol) communication.
Key security risks include:
- Unauthenticated attackers gaining remote access to sensitive user data.
- Leakage of access credentials in plaintext within client and server logs.
According to Cisco, the flaw stems from sensitive data exposure in SIP headers, making credentials vulnerable to interception.
🛠️ Cisco’s Response & Fix
Cisco has acted swiftly by pushing a configuration update for Webex BroadWorks users. The company recommends the following security measures:
✅ Restart the Cisco Webex application to apply the update.
✅ Change credentials immediately to prevent unauthorized access.
⚠️ Who Is Affected?
- Users running Cisco Webex for BroadWorks on Windows.
- Systems with unsecure transport enabled for SIP communication.
This is not the first time Cisco Webex has faced security concerns—last year, sensitive government and corporate metadata were exposed due to another vulnerability.
🔒 How to Protect Yourself
To minimize risks, Webex users should:
✔️ Enable secure transport for SIP communication.
✔️ Regularly update passwords and enable multi-factor authentication (MFA).
✔️ Stay updated with Cisco’s latest security patches.
Cisco states that, as of now, no active exploitation of the flaw has been reported. However, taking preventive measures is crucial.
For more details, visit Cisco’s official security advisory.
GIPHY App Key not set. Please check settings