- Cisco Warn about new vulnerability in Webex for Broadworks
- The error enabled threat actors to steal sensitive files externally
- A solution was already implemented and users had to update right away
Cisco has warned Webex for Broadworks users of a vulnerability that can allow threat actors to access sensitive data externally.
Cisco Webex for Broadworks is a cloud collaboration solution that integrates the video conference tool with BroadWorks-based service provider Networks offering messages, calls and businesses for businesses.
In a security advice published on Cisco’s website, the company said it revealed a vulnerability with low difficulty in the app’s release 45.2, enabling malicious actors access to sensitive data if unsecured transport is configured for the SIP communication.
Exploit the error
“This vulnerability is due to the exposure of sensitive information in the SIP headings,” Cisco explained.
It also added that it discovered a related problem that could give a non -approved user access to credentials in regular text, in the client and server logs.
“A malicious actor could utilize this vulnerability and the related problem to access data and credentials and emulate the user,” Cisco warned.
As the company was already making a configuration change that will solve both the vulnerability and the related problem, users are recommended to restart their Cisco Webex applications to apply the changes. For those who would rather implement a solution, Cisco said administrators could configure secure transport to SIP communication to encrypt data during transit.
“Cisco also recommends rotating credentials to protect against the possibility that the credentials are acquired by a malicious actor,” the advisory concludes. So far, there has been no evidence that vulnerability was abused in nature.
In early February 2025, Cisco Patches released two vulnerabilities to critical difficulty that plagues its Identity Services Engine (ISE) solution. Both could have been used to run arbitrary commands and steal sensitive information.
As the correction was already implemented, it advised its customers to restart the application to apply the configuration changes.
Via Bleeping computer



