Cisco Webex Bug: When SIP Slips, Watch Your Credentials Flip!
Beware: a cunning Cisco Webex vulnerability in Release 45.2 could let sneaky hackers access data and credentials if SIP communication isn’t secure. A simple config change can fix it, but if your Webex isn’t in Windows or predates Release 45.2, you’re safe. Time to update or risk being a victim of the digital heist!

Hot Take:
Well, well, well… looks like Cisco’s Webex for BroadWorks has a little “communication issue.” And by issue, I mean a vulnerability that could potentially let unauthorized folks join the cybersecurity party. Someone call the IT department; we’ve got a SIP-tuation!
Key Points:
- A vulnerability in Cisco Webex for BroadWorks Release 45.2 allows remote attackers to access data and credentials if SIP communication is insecure.
- The vulnerability involves the exposure of sensitive information in SIP headers.
- A related issue could let authenticated users see credentials in plain text in logs.
- Cisco has pushed a configuration change to fix the issue, requiring a restart of the Webex application.
- The problem doesn’t affect non-Windows environments or releases earlier than 45.2.
Already a member? Log in here