Webex fixed some seriously spooky security flaws
Vulnerabilities allowed malicious actors to join Webex meetings as 'ghosts'
Cisco has patched several troubling security vulnerabilities in its Webex video conferencing service.
The flaws in the video conferencing software were flagged by IBM, a Webex customer. The company's IBM Research division and IBM's Office of the CISO took a deeper look at the collaboration tools being used for day-to-day work to better understand how they could impact sensitive meetings now being held virtually. During its investigation, the company's security researchers discovered three vulnerabilities in Webex.
If exploited, these flaws could allow a malicious actor to become a 'ghost' and join a meeting without being detected. They would be unable to be seen on the participant list while still have full access to video, audio, chat and screen-sharing capabilities.
- We've put together a list of the best collaboration software around
- These are the best business webcams for working from home
- Also check out our roundup of the best endpoint protection
To make matters worse, a ghost could remain in a Webex meeting even after being expelled from it while still maintaining an audio connection that would allow them to listen in on sensitive company business. Additionally, a ghost could gain access to information on meeting attendees including their full names, email address and IP addresses from the meeting room lobby even without being admitted to the call.
Webex vulnerabilities
The IBM Research team discovered three vulnerabilities in Cisco Webex, tracked as CVE-2020-3441, CVE-2020-3471 and CVE-2020-3419, while examining the platform for security and privacy implications for businesses.
These flaws affect both scheduled meetings with unique meeting URLs and even Webex Personal Rooms. However, Personal Rooms may be easier to exploit because they are often based on a predictable combination of the room owner's name and the organization name.
Upon its discovery, IBM reported the vulnerabilities to Cisco and they have all now been patched. However, both companies have agreed to limited information dissemination regarding the flaws until all patches have been made available to reduce the risk to the industry as a whole.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
To avoid falling victim to any potential attacks while video conferencing, IBM recommends that organizations test new collaboration tools for security, evaluate confident ail call policies, use unique meeting Ids, implement meeting passwords or PINs, start meetings with a roll call, turn on notifications, immediately end suspicious calls, lock meetings and restart meetings when holding back-to-back calls.
- We've also highlighted the best video conferencing software
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.