CVE-2020-3131

A vulnerability in the Cisco Webex Teams client for Windows could allow an authenticated, remote attacker to cause the client to crash, resulting in a denial of service (DoS) condition. The attacker needs a valid developer account to exploit this vulnerability. The vulnerability is due to insufficient input validation when processing received adaptive cards. The attacker could exploit this vulnerability by sending an adaptive card with malicious content to an existing user of the Cisco Webex Teams client for Windows. A successful exploit could allow the attacker to cause the targeted user's client to crash continuously. This vulnerability was introduced in Cisco Webex Teams client for Windows Release 3.0.13131.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:webex_teams:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cards-dos-FWzNcXPq - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cards-dos-FWzNcXPq - Vendor Advisory

Information

Published : 2020-01-26 05:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3131

Mitre link : CVE-2020-3131

CVE.ORG link : CVE-2020-3131


JSON object : View

Products Affected

cisco

  • webex_teams

microsoft

  • windows
CWE
CWE-400

Uncontrolled Resource Consumption