Cisco WebEx for Firefox RCE (cisco-sa-20170124-webex)

high Nessus Plugin ID 96907


A browser extension installed on the remote host is affected by a remote code execution vulnerability.


The Cisco WebEx Extension for Firefox installed on the remote host is affected by a remote code execution vulnerability due to a crafted pattern that permits any URL utilizing it to automatically use native messaging to access sensitive functionality provided by the extension.
An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code by convincing a user to visit a web page that contains this pattern and starting a WebEx session.


Upgrade ActiveTouch General Plugin Container to version 106, or else upgrade Cisco WebEx Extension to version 1.0.5 or later. However, if you are using both, then you will need to upgrade both.

See Also

Plugin Details

Severity: High

ID: 96907

File Name: cisco_webex_extension_rce_firefox.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 1/31/2017

Updated: 7/6/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: High

Score: 8.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox, cpe:/a:cisco:webex

Required KB Items: installed_sw/Mozilla Firefox

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/28/2017

Vulnerability Publication Date: 1/23/2017

Exploitable With

Metasploit (Cisco WebEx Chrome Extension RCE (CVE-2017-3823))

Reference Information

CVE: CVE-2017-3823

BID: 95737