A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-activation-3sdNFxcy | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-11-03T00:00:00
Updated: 2021-11-04T15:30:17
Reserved: 2021-08-25T00:00:00
Link: CVE-2021-40128
JSON object: View
NVD Information
Status : Modified
Published: 2021-11-04T16:15:09.717
Modified: 2023-11-07T03:38:31.587
Link: CVE-2021-40128
JSON object: View
Redhat Information
No data.
CWE