Network Recording Player is a program developed by Cisco WebEx. The most used version is 30.6.0.10050, with over 6% of all installations currently using this version. It adds a background controller service that is set to automatically run. Delaying the start of this service is possible through the service manager. The main program executable is atStart.exe.
The software installer includes 74 files and is usually about 149.76 MB (157,034,086 bytes). In comparison to the total number of users, most PCs are running the OS Windows 7 (SP1) as well as Windows 10. While about 72% of users of Network Recording Player come from the United States, it is also popular in Canada and India. Program details. Or, you can uninstall Network Recording Player from your computer by using the Add/Remove Program feature in the Window's Control Panel. On the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then, under Programs, do one of the following:.
Windows Vista/7/8: Click Uninstall a Program. Windows XP: Click Add or Remove Programs. When you find the program Network Recording Player, click it, and then do one of the following:. Windows Vista/7/8: Click Uninstall. Windows XP: Click the Remove or Change/Remove tab (to the right of the program). Follow the prompts.
Cisco Webex Meetings Server – All Webex Network Recording Player versions prior to Version 3.0MR2 Patch 1; To determine which version of the Cisco Webex Network Recording Player or the Cisco Webex Player is installed on a system, users can open the player and choose Help > About.
A progress bar shows you how long it will take to remove Network Recording Player. How do I reset my web browser?
Google Chrome. Open Chrome and click the Chrome menu on the browser toolbar. Select Settings. In the 'Search' section, click Manage search engine. Check if (Default) is displayed next to your preferred search engine.
If not, mouse over it and click Make default. Mouse over any other suspicious search engine entries that are not familiar and click X to remove them. When the 'Show Home button' checkbox is selected, a web address appears below it.
If you want the Homepage button to open up a different webpage, click Change to enter a link. Restart Google Chrome.
Cisco released security patches to fix RCE flaws in the Webex Network Recording Player for Advanced Recording Format (ARF). Cisco released security patches to address vulnerabilities in the Webex Network Recording Player for Advanced Recording Format (ARF) (CVE-2018-15414, CVE-2018-15421, and CVE-2018-15422) that could be exploited by an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system The Webex Meetings Server is a collaboration and communications solution that can be deployed on a private cloud and which manages the Webex Meetings Suite services and Webex Meetings Online hosted multimedia conferencing solutions. The Meetings services allow customers to record meetings and store them online or in an ARF format or on a local computer, in WRF format. The relative player Network Recording Player can be installed either automatically when a user accesses a recording file hosted on a Webex Meetings Suite site or manually by downloading it from the Webex site. The lack of proper validation for the Webex recording files is the root cause of the vulnerabilities that could allow unauthenticated, remote attacker to execute arbitrary code on the target machine. “Multiple vulnerabilities in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.” reads the security advisory published by Cisco. “The vulnerabilities are due to improper validation of Webex recording files.
An attacker could exploit these vulnerabilities by sending a user a link or email attachment containing a malicious file and persuading the user to open the file in the Cisco Webex Player. A successful exploit could allow the attacker to execute arbitrary code on an affected system.” An attacker could exploit the flaw by tricking victims into opening a malicious file in the Cisco Webex Player, the file could be sent via email as an attachment or through a link in the content referencing it. The vulnerabilities affect the following ARF recording players:. Cisco Webex Meetings Suite (WBS32) – Webex Network Recording Player versions prior to WBS32.15.10. Cisco Webex Meetings Suite (WBS33) – Webex Network Recording Player versions prior to WBS33.3. Cisco Webex Meetings Online – Webex Network Recording Player versions prior to 1.3.37. Cisco Webex Meetings Server – Webex Network Recording Player versions prior to 3.0MR2 Each version of the Webex Network Recording Players for Windows, OS X, and Linux is affected by at least one of the issues.
![Network recording player webex settings Network recording player webex settings](https://www.cisco.com/content/dam/en/us/td/i/400001-500000/420001-430000/421001-422000/421294.jpg)
The following Network Recording Player updates address the vulnerabilities:. Meetings Suite (WBS32) – Player versions WBS32.15.10 and later and Meetings Suite (WBS33) – Player versions WBS33.3 and later;. Meetings Online – Player versions 1.3.37 and later; and Meetings Server – Player versions 3.0MR2 and later.
Cisco warns that there are no known workarounds for these issues. “The Cisco Webex Network Recording Player (for.arf files) will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a Cisco Webex Meetings site that contains the versions previously specified,” concludes the Cisco advisory. Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer.
Editor-in-Chief at 'Cyber Defense Magazine', Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog 'Security Affairs' recently named a Top National Security Resource for US. Pierluigi is a member of the 'The Hacker News' team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books 'The Deep Dark Web' and “Digital Virtual Currency and Bitcoin”.