Cisco WebEx Training Center Bypass Email Verification to Join Audio Conference Vulnerability

Related Vulnerabilities: CVE-2013-6965  

A vulnerability in the training center registration page of Cisco WebEx Training Center could allow an unauthenticated, remote attacker to attend the audio conference for a training session without having to confirm the email address. The vulnerability is due to the disclosure of the training session information URL before registration is complete. An attacker could exploit this vulnerability by gathering the training session access code and password from the disclosed URL and using the information to join the audio conference for a training session without receiving the registration email. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, it is likely that an attacker would need access to the training session URL prior to an exploit attempt. In a typical enterprise environment, the training session URL would originate from a device located on a trusted, internal network, reducing the possibility of a successful attack. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.