a new patch designed to fixVulnerability-related.PatchVulnerabilitya failed update which has not prevented the exploit of a severe Webex vulnerability . The original security flaw , CVE-2018-15442 , is present inVulnerability-related.DiscoverVulnerabilitythe Cisco Webex Meetings Desktop App for Windows and is describedVulnerability-related.DiscoverVulnerabilityas a bug which `` could allow an authenticated , local attacker to execute arbitrary commands as a privileged user . '' Cisco 's original security update was publishedVulnerability-related.PatchVulnerabilityin October in order to remedyVulnerability-related.PatchVulnerabilitythe flaw , in which a lack of validation for user-supplied parameters in the app could be harnessed to exploit the bug . If an attacker is successful in utilizing the vulnerability , they can force the app to run arbitrary commands with user privileges . `` While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access , administrators should be aware that in Active Directory deployments , the vulnerability could be exploitedVulnerability-related.DiscoverVulnerabilityremotely by leveraging the operating system remote management tools , '' the company added . Software releases prior to 33.6.4 -- alongside Cisco Webex Productivity Tools Releases 32.6.0 and later prior to 33.0.6 -- are impacted on Windows systems . It was not long after the releaseVulnerability-related.PatchVulnerabilityof the first patch that researchers from SecureAuth deemed the original fix incomplete . The original patch only forced the service to run files signed by Webex , but failed to account for DLL-based attacks , according to the team . `` The vulnerability can be exploitedVulnerability-related.DiscoverVulnerabilityby copying to a local attacker controller folder , the ptUpdate.exe binary , '' the researchers saidVulnerability-related.DiscoverVulnerabilityin an advisory . `` Also , a malicious dll must be placed in the same folder , named wbxtrace.dll . To gain privileges , the attacker must start the service with the command line : sc start webexservice install software-update 1 `` attacker-controlled-path '' ( if the parameter 1 does n't work , then 2 should be used ) . '' These findings were sent to Cisco , which acknowledged the DLL attack method . A new patch was then issuedVulnerability-related.PatchVulnerabilityroughly a week after being informedVulnerability-related.DiscoverVulnerabilityof the issue . `` After an additional attack method was reported to Cisco , the previous fix for this vulnerability was determined to be insufficient , '' Cisco says . `` A new fix was developedVulnerability-related.PatchVulnerability, and the advisory was updatedVulnerability-related.PatchVulnerabilityon November 27 , 2018 , to reflect which software releasesVulnerability-related.PatchVulnerabilityinclude the complete fix . ''