Cisco Webex Flaw Allows HTTP Response Tampering

Home/cisco, Internet Security, Security Advisory, Security Update, vulnerability/Cisco Webex Flaw Allows HTTP Response Tampering

Cisco Webex Flaw Allows HTTP Response Tampering

Cisco has patched a security flaw (CVE-2025-20255) in its Webex Meetings service that could let attackers manipulate cached HTTP responses. The bug was rated with a CVSS score of 4.3 (medium severity).

Cisco Webex Flaw

The issue came from how the Webex client join services handled malicious HTTP requests. Security researcher Matthew B. Johnson (d3d) discovered and reported the vulnerability, known as an HTTP cache poisoning flaw.

Attackers could use this vulnerability to trick the server into caching a malicious response, which would then be served to other users. This could lead to misleading or harmful content being shown during meetings. Fortunately, Cisco has already fixed the problem on its cloud servers, so no customer action is needed.

What is HTTP Cache Poisoning?

HTTP cache poisoning happens when an attacker sends a specially crafted request to a web server. If the server caches that response, other users may receive the attacker’s modified content.

In the case of Webex, the attack exploited how the system handled unkeyed inputs in HTTP requests—parts of the request that affect the response but are not considered when caching.

Because the vulnerability didn’t require authentication and was low in complexity, it could have been used widely if not patched quickly.

Technical Details

  • Type: HTTP cache poisoning (CWE-349)
  • Impact: Integrity (e.g., altered content served to users)
  • Attack Complexity: Low
  • User Interaction: Required
  • Authentication: Not needed
  • Affected Product: Cisco Webex Meetings (cloud-based only)
  • CVSS Score: 4.3 (Medium)

Cisco has secured its infrastructure, but administrators are encouraged to stay aware of how shared cache systems can be used in attacks like this.

Mitigation

Cisco has already fixed this vulnerability in its cloud-based Webex Meetings platform, so users don’t need to take any action. According to Cisco’s advisory, “No user action is required,” and there are no available workarounds.

Cisco’s security team also confirmed that there was no sign of the bug being exploited in the wild.

Still, organizations using Webex should make sure they’re on the latest version of the service with the patch applied.

For extra protection against similar cache poisoning issues, security experts recommend validating all user inputs (especially in HTTP headers), configuring web caches carefully, and using HTTP response headers like Vary to manage how responses are cached.

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2025-05-26T19:47:38+05:30 May 22nd, 2025|cisco, Internet Security, Security Advisory, Security Update, vulnerability|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!