Webex Service Status - Incident History
Statuspage
Webex Calling Service Maintenance: April 25, 2024
25/04 - 2024
Locations: Texas Data Center Change #: CHG0611060 completed - This maintenance has been completed and all services are fully operational. Apr 25, 06:37 UTCin progress - The maintenance is currently in progress. Apr 25, 02:00 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Thursday, April 25, 2024, 02:00 UTC Complete: Thursday, April 25, 2024, 10:00 UTC -- Affected...
Webex Meetings: Clusters B & IJ Service Maintenance: May 10, 2024
24/04 - 2024
Locations: Clusters B, IJ Change #: CHG0606193 scheduled - Webex Engineering has scheduled a maintenance window to support ongoing service maintenance for Webex Meeting Services. -- Scheduled Maintenance Window -- Start: Friday, May 10, 2024, 7:00 PM PDT (UTC-7) Complete: Friday, May 10, 2024, 11:59 PM PDT (UTC-7) -- User Experience -- During the maintenance window, hosts and participants may experience the following service impacts: -NBR Recording: NBR Recording WILL be...
Webex Calling Service Maintenance: April 24, 2024
24/04 - 2024
Locations: Japan, Singapore, South Korea, and India Data Centers Change #: CHG0607042 completed - This maintenance has been completed and all services are fully operational. Apr 24, 16:00 UTCin progress - The maintenance is currently in progress. Apr 24, 15:30 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, April 24, 2024, 15:30 UTC Complete: Wednesday...
Webex Calling Service Maintenance: April 24, 2024
24/04 - 2024
Locations: Australia Data Center Change #: CHG0607041 completed - This maintenance has been completed and all services are fully operational. Apr 24, 14:29 UTCin progress - The maintenance is currently in progress. Apr 24, 12:52 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, April 24, 2024, 13:00 UTC Complete: Wednesday, April 24, 2024, 19:00 UTC --...
Webex Calling Service Maintenance: April 24, 2024
24/04 - 2024
Locations: Canada, Chicago, and Texas Data Centers Change #: CHG0608926 completed - This maintenance has been completed and all services are fully operational. Apr 24, 06:03 UTCin progress - The maintenance is currently in progress. Apr 24, 03:02 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, April 24, 2024, 03:00 UTC Complete: Wednesday, April 24, 2024,...
Webex Calling Service Maintenance: April 24, 2024
24/04 - 2024
Locations: Chicago and Texas Data Centers Change #: CHG0607040 completed - This maintenance has been completed and all services are fully operational. Apr 24, 04:08 UTCin progress - The maintenance is currently in progress. Apr 24, 01:58 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, April 24, 2024, 02:00 UTC Complete: Wednesday, April 24, 2024, 08:00...
Webex Calling Service Maintenance: April 23, 2024
24/04 - 2024
Locations: Frankfurt, Amsterdam, and London Data Centers Change #: CHG0608932 completed - This maintenance has been completed and all services are fully operational. Apr 23, 23:03 UTCin progress - The maintenance is currently in progress. Apr 23, 21:01 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Tuesday, April 23, 2024, 21:00 UTC Complete: Wednesday, April 24...
Webex Calling Service Maintenance: May 08, 2024
24/04 - 2024
Locations: Frankfurt Data Center Change #: CHG0610810 scheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, May 08, 2024, 22:00 UTC Complete: Thursday, May 09, 2024, 04:00 UTC -- Affected Services -- Webex Calling / Webex Calling for Carrier -- User Experience -- Rialto portals (Service Provider Portal, Customer Admin Portal, Customer User Portal) and...
Webex Calling Service Maintenance: May 08, 2024
24/04 - 2024
Locations: Canada, Chicago, and Texas Data Centers Change #: CHG0612099 scheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, May 08, 2024, 03:00 UTC Complete: Wednesday, May 08, 2024, 07:00 UTC -- Affected Services -- Webex Calling / Webex Calling Wholesale / Webex Calling for Carrier / Webex Contact Center -- User Experience -- During the Webex Calling...
Webex Calling Service Maintenance: May 07, 2024
24/04 - 2024
Locations: Frankfurt, Amsterdam, and London Data Centers Change #: CHG0612104 scheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Tuesday, May 07, 2024, 21:00 UTC Complete: Wednesday, May 08, 2024, 02:00 UTC -- Affected Services -- Webex Calling / Webex Calling Wholesale / Webex Calling for Carrier -- User Experience -- During the Webex Calling Application Server...

Heise Security-Alerts

Security-Alert Meldungen

  • Sicherheitsupdates: Angreifer können GitLab-Accounts übernehmen

    <p><a href="https://www.heise.de/news/Sicherheitsupdates-Angreifer-koennen-GitLab-Accounts-uebernehmen-9699252.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/0/0/7/1/shutterstock_1494931898-f9bd87b2d71bc629.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Wichtige Sicherheitsupdates schließen mehrere Sicherheitslücken in GitLab. Der Anbieter rät zu einem zügigen Update. </p>

  • Cross-Site Scripting: Sicherheitslücken in pfSense ermöglichen Admin-Cookieklau

    <p><a href="https://www.heise.de/news/Cross-Site-Scripting-Sicherheitsluecken-in-pfSense-ermoeglichen-Admin-Cookieklau-9696756.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/8/7/6/2/shutterstock_1391207630-3a58ce78ce0b4f2a.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Die Open-Source-Firewall pfSense hat mehrere Löcher, durch die Angreifer eigenen Javascript-Code einschleusen können. Updates sind verfügbar.</p>

  • Cisco: Angreifer plazieren mithilfe neuer 0-Day-Lücke Hintertüren auf Firewalls

    <p><a href="https://www.heise.de/news/Cisco-Angreifer-plazieren-mithilfe-neuer-0-Day-Luecke-Hintertueren-auf-Firewalls-9697459.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/9/1/2/6/2024-04-04-Bing_Designer-Cisco_Appliances-1-2160px-1d2ca99393aed7d1.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Zwei geschickt gestaltete Hintertüren auf Geräten mit Ciscos ASA- und FTD-System überleben Reboots und Systemupdates. Viele Details sind noch unklar.</p>

  • AMD Radeon-Grafiktreiber: Update schließt Codeschmuggel-Lücke

    <p><a href="https://www.heise.de/news/AMD-Radeon-Grafiktreiber-Update-schliesst-Codeschmuggel-Luecke-9695994.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/8/3/4/3/2024-02-22-Bing-Designer-Splintered_Security-Shield_on_Laptop-1280px-301304d28ba734e9.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>AMD hat Updates für Radeon-Grafiktreiber für DirectX 11 veröffentlicht. Sie schließen Sicherheitslücken, durch die Angreifer Schadcode einschleusen können.</p>

  • Jetzt patchen! Attacken auf Dateiübertragungsserver CrushFTP beobachtet

    <p><a href="https://www.heise.de/news/Jetzt-patchen-Attacken-auf-Dateiuebertragungsserver-CrushFTP-beobachtet-9693009.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/6/7/8/5/shutterstock_1504494320-0bee224cc964f2c3.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Angreifer haben Zugriff auf Systemdaten von CrushFTP-Servern. Verwundbare Systeme gibt es auch in Deutschland.</p>

  • FIDO2-Sticks: Lücke in Yubikey-Verwaltungssoftware erlaubt Rechteausweitung

    <p><a href="https://www.heise.de/news/FIDO2-Sticks-Luecke-in-Yubikey-Verwaltungssoftware-erlaubt-Rechteausweitung-9690597.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/5/5/2/1/2024-02-25-Bing_Designer-Passkeys_2-1920px-60cf8266f729de38.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Um die FIDO2-Sticks von Yubikey zu verwalten, stellt der Hersteller eine Software bereit. Eine Lücke darin ermöglicht die Ausweitung der Rechte.</p>

  • Mitel SIP-Phones anfällig für unbefugte Zugriffe

    <p><a href="https://www.heise.de/news/Mitel-SIP-Phones-anfaellig-fuer-unbefugte-Zugriffe-9690432.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/5/4/3/4/2024-04-09-Bing_Designer-Krimineller_Einbruch_Telefon-2-2160px-a348702c6947a8ad.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Mitel-SIP-Phones und -Konferenz-Produkte ermöglichen unbefugte Zugriffe und das Ausführen von Schadcode. Updates stehen bereit.</p>

  • Update für Solarwinds FTP-Server Serv-U schließt Lücke mit hohem Risiko

    <p><a href="https://www.heise.de/news/Update-fuer-Solarwinds-FTP-Server-Serv-U-schliesst-Luecke-mit-hohem-Risiko-9689092.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/4/7/3/8/2024-03-15-Bing_Designer-Schutz-2-2160px-58567e35983673ab.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Im Solarwinds Serv-U-FTP-Server klafft eine als hohes Risiko eingestufte Sicherheitslücke. Der Hersteller dichtet sie mit einem Update ab.</p>

  • Jetzt patchen! Root-Attacken auf Cisco IMC können bevorstehen

    <p><a href="https://www.heise.de/news/Jetzt-patchen-Root-Attacken-auf-Cisco-IMC-koennen-bevorstehen-9689086.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/4/7/3/5/cisco2-2e245a9592570362.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Es sind wichtige Sicherheitsupdates für Cisco Integrated Management Controller und IOS erschienen. Exploitcode ist in Umlauf.</p>

  • Palo-Alto-Firewalls: Mehr Angriffe und Proofs-of-Concept aufgetaucht

    <p><a href="https://www.heise.de/news/Palo-Alto-Firewalls-Mehr-Angriffe-und-Proofs-of-Concept-aufgetaucht-9688195.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/7/4/2/6/7/2024-04-10-Bing_Designer-Brennende_Appliances-2-2160px-572e5995e1490a93.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Für die root-Zugriffslücke in Firewalls von Palo Alto Networks sind Proof-of-Concept-Exploits aufgetaucht. Angriffe nehmen zu. </p>