Cisco publishes a Privacy Data Sheet covering Webex meetings which describes the processing of personal data or PII. Data is collected from meeting hosts and participants and includes:
- Name
- Email Address
- Public IP Address
- IP Addresses Along the Network Path
- Web browser information
- MAC Address of Your Client (as applicable)
- Actions Taken
- Geographic region
- Meeting Session Information (title, data and time, frequency, average and actual duration, quantity, quality, network activity, and network connectivity)
One particular interesting bit I liked seeing is that Cisco makes it clear that if you’re using a Webex Meetings account at work, the data is accessible to your employer, who may have their own policies concerning use, monitoring, and retention of the data. In the same vein, if you participate in a meeting hosted by another organization, the Webex Meetings data is thus under their data policies.
Vulnerabilities
One new threat to Webex Meetings users isn’t a vulnerability present in Webex itself at all.
According to email security company Abnormal Security, between 2,800 and 5,000 mailboxes have received phishing emails after their usernames and passwords. The
email steals graphics and formatting from legitimate Cisco emails and closely resembles the automated SSL certificate error alerts
that Cisco does send out. The login link goes not to Webex, however, but at the domain “app-login-webex.com” – additionally, the app-login-webex.com link is wrapped in a SendGrid link for concealment.
If you thought the Webex-bombing example above was bad, it’s only recently that Webex meeting passwords actually work in all cases. A vulnerability called
CVE-2020-3142
which Cisco discovered in late January 2020
allowed unauthorized parties to join a Webex
meeting from an iOS or Android device
even when password protection was in use. Cisco has fixed the problem on the platform side – no user action is required.
This comes after a group of high severity vulnerabilities (CVE-2019-1771, CVE-2019-1772, CVE-2019-1773) in May 2019 allowing remote code execution attacks in Webex software for Windows.
Encryption
In the Privacy Data Sheet, Cisco attests that currently, all personal data is encrypted in transit, and some at rest. In a
technical whitepaper about Webex security, Cisco says that all Webex Meetings media streams – audio, video, VoIP, screen share, and document share – are encrypted between you and Webex Cloud. Webex Cloud service then re-encrypts the media stream before sending it to other users. A possible exception to this is if your company as a Webex customer enable joining your meetings using third-party video end points – in this case those attendees may be sending your meeting data across the Internet unencrypted.
Typically, the UDP protocol is used for media stream transmission and it is encrypted using AES-128. A block cipher mode is not specified.
Like other providers, the media streams are decrypted by Webex Cloud (inside Cisco’s firewalls) so the service itself can record the meetings. For businesses that want or require it, Cisco optionally provides true end-to-end encryption where the media streams are not decrypted in Webex Cloud, but this comes at a cost. It removes these Webex Meetings features:
- Ability to use the Web App instead of the desktop client;
- Cloud based meeting recording;
- Join Before Host
- Video Endpoints
SSL Labs gives Webex Meetings URLs *.my.webex.com an A+ rating. Note that these sites do not support anything lower than TLS 1.2, so Cisco is a little ahead of the rest regarding deprecation of TLS 1.1 and 1.0 support.