Original Article Text

Click to Toggle View

Cisco Webex bug lets hackers gain code execution via meeting links. Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution using malicious meeting invite links. Tracked as CVE-2025-20236, this security flaw was found in the Webex custom URL parser and can be exploited by tricking users into downloading arbitrary files, which lets threat actors execute arbitrary commands on systems running unpatched software in low complexity attacks. "This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link," Cisco explained in a security advisory released this week. "An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user." This security bug impacts Cisco Webex App installations regardless of operating system or system configuration. There are no workarounds, so software updates are required to block potential exploitation attempts. This week, Cisco also released security patches for a privilege escalation flaw (CVE-2025-20178) in Secure Network Analytics' web-based management interface, which can let attackers with admin credentials run arbitrary commands as root. Cisco also addressed a Nexus Dashboard vulnerability (CVE-2025-20150) that allows unauthenticated attackers to enumerate LDAP user accounts remotely and determine which usernames are valid. However, the company's Product Security Incident Response Team (PSIRT) found no proof-of-concept exploits in the wild and no evidence of malicious activity targeting systems unpatched against security flaws fixed this Wednesday. Earlier this month, Cisco also warned admins to patch a critical Cisco Smart Licensing Utility (CSLU) static credential vulnerability (CVE-2024-20439) that exposes a built-in backdoor admin account and is now actively exploited in attacks. In late March, CISA added the CVE-2024-20439 flaw to its Known Exploited Vulnerabilities Catalog and ordered U.S. federal agencies to secure their networks against ongoing attacks within three weeks by April 21.

Daily Brief Summary

MALWARE // Cisco Webex Vulnerability Allows Hackers Remote Code Execution

Cisco has issued updates for a critical vulnerability in Webex, identified as CVE-2025-20336, which permits unauthenticated remote code execution through malicious meeting links.

The flaw stems from insufficient validation of inputs in Webex’s custom URL parser, allowing attackers to trick users into downloading dangerous files to execute commands.

Attackers can exploit this by persuading a user to click a specially crafted meeting invite link, leading to arbitrary command execution under user privileges.

This vulnerability affects all Cisco Webex App installations across different operating systems with no available workaround; updating the software is essential to mitigate risks.

Cisco also patched other security issues, including a privilege escalation in Secure Network Analytics and user enumeration vulnerability in Nexus Dashboard.

Despite these vulnerabilities, Cisco's security team has not found any active exploitation or evidence of these vulnerabilities being targeted in the wild.

Additionally, a previously disclosed Cisco vulnerability (CVE-2024-20439) has been actively exploited, prompting urgent update recommendations from CISA for U.S. federal network security.