CVE-2018-15442
HIGHCisco Webex Meetings Desktop < 33.6.4 - OS Command Injection
Title source: ruleDescription
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/45695
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/45696
metasploit
WORKING POC
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/smb/webexec_command.rb
metasploit
WORKING POC
MANUAL
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/webexec.rb
metasploit
WORKING POC
GOOD
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/webexec.rb
References (5)
Scores
CVSS v3
7.8
EPSS
0.4334
EPSS Percentile
97.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (2)
cisco/webex_meetings_desktop
< 33.6.4
cisco/webex_productivity_tools
32.6.0 - 33.0.6
Published
Oct 24, 2018
Tracked Since
Feb 18, 2026