Webex Service Status - Incident History
Statuspage
Webex Meetings: Meeting Services Redirection for Cluster B
15/05 - 2024
Locations: Cluster B Change #: CHG0611169 completed - This maintenance has been completed and all services are fully operational. May 15, 03:29 UTCin progress - Meeting services for your site have been directed to the secondary system for extended maintenance. Sites recently upgraded to a new version will be reverted to the previous version while on the secondary system. The new version will be made available again once services are redirected to the primary system. Also, any sites that...
Webex Calling Service Maintenance: May 14, 2024
14/05 - 2024
Locations: Canada Data Center Change #: CHG0614526 completed - This maintenance has been completed and all services are fully operational. May 14, 04:19 UTCin progress - The maintenance is currently in progress. May 14, 01:56 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Tuesday, May 14, 2024, 02:00 UTC Complete: Tuesday, May 14, 2024, 08:00 UTC -- Affected...
Webex Calling Service Maintenance: May 13, 2024
13/05 - 2024
Locations: Japan Data Center Change #: CHG0610819 completed - This maintenance has been completed and all services are fully operational. May 13, 15:54 UTCin progress - The maintenance is currently in progress. May 13, 12:58 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Monday, May 13, 2024, 13:00 UTC Complete: Monday, May 13, 2024, 19:00 UTC -- Affected...
Webex Meetings: Clusters B & IJ Service Maintenance: May 10, 2024
11/05 - 2024
Locations: Clusters B, IJ Change #: CHG0606193 completed - This maintenance has been completed and all services are fully operational. May 11, 06:33 UTCin progress - The maintenance is currently in progress. May 11, 02:51 UTCscheduled - Webex Engineering has scheduled a maintenance window to support ongoing service maintenance for Webex Meeting Services. -- Scheduled Maintenance Window -- Start: Friday, May 10, 2024, 7:00 PM PDT (UTC-7) Complete: Friday, May 10, 2024, 11:59 PM PDT...
Webex Meetings: Failures for some users scheduling meeting via Microsoft 365
10/05 - 2024
Component Status: Commercial / Webex Meetings - Operational Locations: All Clusters resolved - Services remain healthy and stable. The issue is now resolved. We appreciate your patience while we addressed this service incident. May 10, 14:45 UTCmonitoring - Services are now restored and are fully functional. We will continue to monitor to ensure service stability. May 10, 14:29 UTCidentified - Engineering has identified the issue and determined that the Scheduler authentication failure...
Webex Meetings: Cluster AS Extended Service Maintenance: May 17, 2024
10/05 - 2024
Locations: Clusters AS Change #: CHG0614318 scheduled - Webex Engineering has scheduled a maintenance window to support ongoing service maintenance for Webex Meeting Services. -- Scheduled Maintenance Window -- Start: Friday, May 17, 2024, 8:30 PM SGT (UTC+8) Complete: Monday, May 20, 2024, 1:30 AM SGT (UTC+8) -- User Experience -- During the maintenance window, hosts and participants may experience the following service impacts: -NBR Recording: NBR Recording WILL be available...
Webex Calling Service Maintenance: May 08, 2024
9/05 - 2024
Locations: Frankfurt Data Center Change #: CHG0610810 completed - This maintenance has been completed and all services are fully operational. May 8, 23:39 UTCin progress - The maintenance is currently in progress. May 8, 22:00 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, May 08, 2024, 22:00 UTC Complete: Thursday, May 09, 2024, 04:00 UTC -- Affected...
Webex Calling Service Maintenance: May 23, 2024
9/05 - 2024
Locations: Australia, Japan, Singapore, and South Korea Data Centers Change #: CHG0614535, CHG0614534 scheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Thursday, May 23, 2024, 13:00 UTC Complete: Thursday, May 23, 2024, 19:00 UTC -- Affected Services -- Webex Calling / Webex Calling for Carrier / Webex Contact Center -- User Experience -- Rialto portals (Service...
Webex Calling Service Maintenance: May 23, 2024
8/05 - 2024
Locations: Chicago and Texas Data Centers Change #: CHG0614533 scheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Thursday, May 23, 2024, 02:00 UTC Complete: Thursday, May 23, 2024, 08:00 UTC -- Affected Services -- Webex Calling / Webex Calling for Carrier / Webex Contact Center -- User Experience -- Rialto portals (Service Provider Portal, Customer Admin...
Webex Calling Service Maintenance: May 08, 2024
8/05 - 2024
Locations: Canada, Chicago, and Texas Data Centers Change #: CHG0612099 completed - This maintenance has been completed and all services are fully operational. May 8, 06:03 UTCin progress - The maintenance is currently in progress. May 8, 03:00 UTCscheduled - Webex Engineering has planned a maintenance window to support ongoing service maintenance and system upgrades. -- Scheduled Maintenance Window -- Start: Wednesday, May 08, 2024, 03:00 UTC Complete: Wednesday, May 08, 2024, 07:00...

Heise Security-Alerts

Security-Alert Meldungen

  • Patchday: Angreifer können Schadcode durch Lücken in Adobe-Software schieben

    <p><a href="https://www.heise.de/news/Patchday-Angreifer-koennen-Schadcode-durch-Luecken-in-Adobe-Software-schieben-9718639.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/9/0/3/5/0/Patchday_Adobe_2023-69bf953337ee5001.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Der Softwarehersteller Adobe hat unter anderem Animate, Illustrator und Reader vor möglichen Attacken abgesichert. </p>

  • VMware Workstation und Fusion: Ausbruch aus Gastsystem möglich

    <p><a href="https://www.heise.de/news/VMware-Workstation-und-Fusion-Ausbruch-aus-Gastsystem-moeglich-9718624.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/9/0/3/4/0/2024-02-22-Bing-Designer-Burning_vmware_Logo_on_Laptop-1280px-1427ce4697d317e7.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>In VMware Workstation und Fusion klaffen Sicherheitslücken, die beim Pwn2Own-Wettbewerb missbraucht wurden. Sie ermöglichen den Ausbruch aus dem Gastsystem.</p>

  • Patchday: Angreifer attackieren Windows und verschaffen sich Systemrechte

    <p><a href="https://www.heise.de/news/Patchday-Angreifer-attackieren-Windows-und-verschaffen-sich-Systemrechte-9718608.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/9/0/3/3/2/Patchday_Windows_2023-90742a8c7e7ee952.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Microsoft hat wichtige Sicherheitsupdates für unter anderem Edge, Dynamics 365 und Windows veröffentlicht. Es gibt bereits Attacken. </p>

  • SAP-Patchday: Angreifer können Systeme durch Sicherheitslücke kompromittieren

    <p><a href="https://www.heise.de/news/SAP-Patchday-Angreifer-koennen-Systeme-durch-Sicherheitsluecke-kompromittieren-9717205.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/9/5/6/0/2024-04-09-Bing_Designer-SAP_SIcherheitsluecke-2-2160px-b636a0626e00bf5e.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>SAP gibt zum Mai-Patchday 14 neue Sicherheitsnotizen heraus. Angreifer können durch die Lücken etwa Schadcode einschmuggeln.</p>

  • Monitoring-Software: Cacti-Sicherheitslücken erlauben Einschleusen von Schadcode

    <p><a href="https://www.heise.de/news/Monitoring-Software-Cacti-Sicherheitsluecken-erlauben-Einschleusen-von-Schadcode-9717005.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/9/4/5/5/2024-05-13-BingDesigner-Laptop_vor_Serverschraenken_brennt-1-2160px-af1f4dbdc63646b4.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Eine aktualisierte Version der Monitoring-Software Cacti schließt mehrere, teils kritische Sicherheitslücken. Angreifer können dadurch Code einschmuggeln.</p>

  • Jetzt updaten! Erneut Zeroday-Lücke in Google Chrome, Exploit verfügbar

    <p><a href="https://www.heise.de/news/Jetzt-updaten-Erneut-Zeroday-Luecke-in-Google-Chrome-Exploit-verfuegbar-9716922.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/9/4/1/1/2024-02-21-Bing-Designer-Burning_Chrome_Logo_on_Laptop-1280px-1766002339b0930d.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Google veröffentlicht erneut ein Notfall-Update für den Webbrowser Chrome. Es gibt schon einen Exploit für die Zero-Day-Lücke.</p>

  • IBM Security Guardium: Lücken erlauben Codeschmuggel und Rechtausweitung

    <p><a href="https://www.heise.de/news/IBM-dichtet-Codeschmuggel-Leck-und-mehr-in-Security-Guardium-ab-9716163.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/9/0/1/6/2024-05-13-BingDesigner-Laptop_vor_Serverschraenken_brennt-3-2160px-abf2831b77b3d4c4.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>IBM hat für seine Cloud-Sicherheitssoftware Security Guardium Updates bereitgestellt. Sie schließen teils kritische Sicherheitslücken.</p>

  • Backup-Managementtool: Schadcode-Lücke bedroht Veeam Service Provider

    <p><a href="https://www.heise.de/news/Backup-Managementtool-Schadcode-Luecke-bedroht-Veeam-Service-Provider-9715535.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/8/6/7/7/shutterstock_1864224370-41968d807659e97c.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Um eine kritische Schwachstelle zu schließen, sollten Admins Veeam Service Provider zeitnah auf den aktuellen Stand bringen. </p>

  • Juniper schließt OpenSSH-Lücken in Junos OS und Junos OS Evolved

    <p><a href="https://www.heise.de/news/Juniper-schliesst-OpenSSH-Luecken-in-Junos-OS-und-Junos-OS-Evolved-9715517.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/8/6/6/8/2024-04-10-Bing_Designer-Brennende_Appliances-1-2160px-f247fa5edcf9e95e.png" class="webfeedsFeaturedVisual" alt=""></a></p> <p>Junos OS und Junos OS Evolved enthalten OpenSSH. Sicherheitslücken darin schließt Juniper nun mit Betriebssystem-Updates.</p>

  • Google Chrome: Exploit für Zero-Day-Lücke gesichtet

    <p><a href="https://www.heise.de/news/Google-Chrome-Exploit-fuer-Zero-Day-Luecke-gesichtet-9714519.html?wt_mc=rss.red.security.alert-news.atom.beitrag.beitrag"><img src="https://www.heise.de/scale/geometry/450/q80//imgs/18/4/5/8/8/1/5/5/2024-02-21-Bing-Designer-Burning_Chrome_Logo_on_Laptop-1280px-1766002339b0930d.jpeg" class="webfeedsFeaturedVisual" alt=""></a></p> <p>In Googles Webbrowser Chrome klafft eine Sicherheitslücke, für die ein Exploit existiert. Google reagiert mit einem Notfall-Update.</p>