Cisco WebEx for Firefox RCE (cisco-sa-20170124-webex)

High Nessus Plugin ID 96907


A browser extension installed on the remote host is affected by a remote code execution vulnerability.


The Cisco WebEx Extension for Firefox installed on the remote host is affected by a remote code execution vulnerability due to a crafted pattern that permits any URL utilizing it to automatically use native messaging to access sensitive functionality provided by the extension.
An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code by convincing a user to visit a web page that contains this pattern and starting a WebEx session.


Upgrade ActiveTouch General Plugin Container to version 106, or else upgrade Cisco WebEx Extension to version 1.0.5 or later. However, if you are using both, then you will need to upgrade both.

See Also

Plugin Details

Severity: High

ID: 96907

File Name: cisco_webex_extension_rce_firefox.nasl

Version: $Revision: 1.7 $

Type: local

Agent: windows

Family: Windows

Published: 2017/01/31

Modified: 2017/09/27

Dependencies: 96534

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 8.8

Temporal Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:mozilla:firefox, cpe:/a:cisco:webex

Required KB Items: installed_sw/Mozilla Firefox

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/01/28

Vulnerability Publication Date: 2017/01/23

Exploitable With

Metasploit (Cisco WebEx Chrome Extension RCE (CVE-2017-3823))

Reference Information

CVE: CVE-2017-3823

BID: 95737

OSVDB: 150755

CISCO-SA: cisco-sa-20170124-webex

CISCO-BUG-ID: CSCvc86959, CSCvc88194, CSCvc88535

CERT: 909240