Tag Archive for: WebEx

Cisco to offer Webex air-gapped cloud system for security, defense work


Building on its WebEx product line, Cisco plans to deliver an air-gapped, cloud-based collaboration system  for companies involved in US national security and defense work, extending the secure offerings the company already provides to industries that require collaboration tools with strong security measures to meet US government requirements.

Beginning in 2024, the new Webex system — Air-Gapped Trusted Cloud — will provide an added layer of security for teams collaborating through the Webex App, Cisco said.

An air gap is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. For example, an air-gapped computer is unable to connect to the internet or any other communications networks so as to have complete security with the information that resides within it.

Currently, the US government has an established approach to security assessment and authorization for cloud products and services for national security and defense. This includes air-gapped cloud deployments, which are isolated from public networks and operated on US soil by local staff with specific security clearances to handle sensitive data.

With the upcoming system for air-gapped cloud deployments, Cisco says that the new Webex tools will meet the security standards required by US agencies involved in national security and defense without compromising user experience.

“We have augmented our Webex collaboration solution with additional government-required security controls and operational capabilities so it can be deployed in a disconnected environment,” said Jeetu Patel, executive vice president and general manager for security and collaboration at Cisco. “This approach allows us to offer the modern experience to the National Security and Defense community.”

Source…

Cisco rolls out fix for Webex flaws that let hackers eavesdrop on meetings


Promotional image for video-conferencing software.

Cisco is rolling out fixes for three vulnerabilities in its Webex video-conference software that made it possible for interlopers to eavesdrop on meetings as a “ghost,” meaning being able to view, listen, and more without being seen by the organizer or any of the attendees.

The vulnerabilities were discovered by IBM Research and the IBM’s Office of the CISO, which analyzed Webex because it’s the company’s primary tool for remote meetings. The discovery comes as work-from-home routines have driven a more than fivefold increase in the use of Webex between February and June. At its peak, Webex hosted up to 4 million meetings in a single day.

The vulnerabilities made it possible for an attacker to:

  • Join a meeting as a ghost, in most cases with full access to audio, video, chat, and screen-sharing capabilities
  • Maintain an audio feed as a ghost even after being expelled by the meeting leader
  • Access full names, email addresses, and IP addresses of meeting attendees, even when not admitted to a conference room.

Cisco is in the process of rolling out a fix now for the vulnerabilities, which are tracked as CVE-2020-3441, CVE-2020-3471, and CVE-2020-3419. Below is a video demonstration and deeper explanation:

IBM Works with Cisco to Exorcise Ghosts from Webex Meetings.

Manipulating the handshake

Attacks work by exploiting the virtual handshake that Webex uses to establish a connection between meeting participants. The process works when an end user and server exchange join messages that include information about the attendees, the end-user application, meeting ID, and meeting-room details. In the process, Webex establishes a WebSocket connection between the user and the server.

“By manipulating some of the key fields about an attendee sent over a WebSocket when joining a meeting, the team was able to inject the carefully crafted values that allow someone to join as a ghost attendee,” IBM researchers wrote in a post published on Wednesday. “This worked because of improper handling of the values by the server and other participants’ client applications. For example,…

Source…

Week in review: Web shell malware, client-side web security, phishers exploit Zoom and WebEx

Here’s an overview of some of last week’s most interesting news and articles: 46% of SMBs have been targeted by ransomware, 73% have paid the ransom …
internet security – read more

Week in review: Web shell malware, client-side web security, phishers exploit Zoom and WebEx – Help Net Security

Week in review: Web shell malware, client-side web security, phishers exploit Zoom and WebEx  Help Net Security
“internet security news” – read more