Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses

Cisco disclosed a security vulnerability (CVE-2025-20255) affecting its Webex Meetings service that could allow remote attackers to manipulate cached HTTP responses.  The vulnerability, assigned a CVSS score of 4.3 (Medium severity), stems from improper handling of malicious HTTP requests in the client join services component.  Security researcher Matthew B. Johnson (d3d) is credited with discovering […] The post Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses appeared first on Cyber Security News.

May 22, 2025 - 20:30
 0
Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses

Cisco disclosed a security vulnerability (CVE-2025-20255) affecting its Webex Meetings service that could allow remote attackers to manipulate cached HTTP responses. 

The vulnerability, assigned a CVSS score of 4.3 (Medium severity), stems from improper handling of malicious HTTP requests in the client join services component. 

Security researcher Matthew B. Johnson (d3d) is credited with discovering and reporting this HTTP cache poisoning vulnerability to Cisco.

The vulnerability enables unauthenticated attackers to exploit cache behavior to serve malicious content to Webex users. Cisco has already addressed the issue in its cloud-based platform, requiring no action from customers using the service.

Understanding HTTP Cache Poisoning Attacks

HTTP cache poisoning is an advanced attack technique where malicious actors exploit how web servers and caches process requests to deliver harmful content to multiple users. 

The attack involves two critical phases: first, the attacker must trigger a response from the back-end server containing a dangerous payload; second, they must ensure this compromised response is cached and subsequently served to intended victims.

The vulnerability in Webex Meetings specifically involves manipulating unkeyed inputs in HTTP requests. Web caches identify resources using specific request components (known as the cache key) while ignoring unkeyed inputs. 

When these unkeyed inputs affect the generated response but aren’t part of the cache decision-making process, attackers can inject payloads that alter responses for all users accessing the same cached resource.

A successful cache poisoning attack against Webex could potentially impact numerous users without requiring additional interaction from the attacker. 

As security experts explained, “The poisoned response will only be served to users who visit the affected page while the cache is poisoned.”

Technical Exploitation 

The Webex vulnerability (CWE-349) allows attackers to manipulate HTTP responses by exploiting how the service handles malicious HTTP requests

Unlike traditional cross-site scripting attacks that target individual users, cache poisoning attacks leverage shared caching infrastructure to amplify impact.

The attack vector requires no authentication (AV:N) and has low attack complexity (AC: L), though it does require user interaction (UI:R) to complete the exploit chain. 

The advisory indicates that while the vulnerability allows for integrity impacts (I:L), no confidentiality (C:N) or availability (A:N) concerns were reported.

Attackers could potentially force the Webex Meetings service to return incorrect HTTP responses to clients joining meetings. 

This could lead to various security issues, including session disruption or potentially more severe consequences if chained with other vulnerabilities.

Risk FactorsDetails
Affected ProductsCisco Webex Meetings (cloud-based service; no on-premises systems impacted)
ImpactIntegrity compromise via HTTP cache poisoning, enabling manipulated responses to clients
Exploit PrerequisitesNo privileges required
CVSS 3.1 Score4.3 (Medium)

Mitigation

Cisco has already addressed the vulnerability in its cloud-based Webex Meetings service, with no customer action required for remediation. 

According to the security advisory, “No user action is required” and “There are no workarounds that address this vulnerability”.

The Cisco Product Security Incident Response Team (PSIRT) reported no evidence of public exploitation of this vulnerability at the time of disclosure. 

Organizations using Cisco Webex Meetings should ensure they’re using the latest version of the service, which already includes the fix.

Security experts recommend several preventive measures for organizations concerned about web cache poisoning vulnerabilities: validate and sanitize all user inputs, especially HTTP headers; ensure proper cache configuration; and consider implementing response headers like Vary to control caching behavior.

Equip your SOC team with deep threat analysis for faster response -> Get Extra Sandbox Licenses for Free

The post Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses appeared first on Cyber Security News.