<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Slido — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/slido/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 16:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/slido/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Slido Insecure Direct Object Reference Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-slido-idor/</link><pubDate>Wed, 06 May 2026 16:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-slido-idor/</guid><description>An insecure direct object reference in Cisco Slido's REST API could have allowed an authenticated remote attacker to access social profile data or affect quiz/poll results.</description><content:encoded><![CDATA[<p>A vulnerability in the REST API of Cisco Slido, a web-based audience interaction platform, could have been exploited by an authenticated, remote attacker. The vulnerability stems from an insecure direct object reference (IDOR). An attacker could potentially leverage this vulnerability to access sensitive social profile data of other users within the Slido platform or manipulate quiz and poll results. Cisco has addressed this vulnerability in their Slido service; no specific version numbers are mentioned in the advisory. The scope of the targeting is all users of the Slido platform.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Cisco Slido platform using valid credentials.</li>
<li>Attacker identifies a vulnerable REST API endpoint related to user profile data or quiz/poll results.</li>
<li>Attacker crafts a malicious request to the API endpoint, manipulating the object reference (e.g., user ID or poll ID) to target another user&rsquo;s profile or a specific poll.</li>
<li>The crafted request is sent to the Cisco Slido server.</li>
<li>Due to the IDOR vulnerability, the server processes the request without proper authorization checks, granting access to the targeted user&rsquo;s social profile data or allowing modification of quiz/poll results.</li>
<li>Attacker views the retrieved social profile data of the targeted user, potentially including sensitive information.</li>
<li>Alternatively, the attacker successfully alters the quiz/poll results, skewing outcomes or manipulating participation data.</li>
<li>The attacker continues to exploit the vulnerability to gather more user data or further manipulate quiz/poll results, impacting the integrity of the Slido platform.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could have resulted in unauthorized access to sensitive user data, including social profiles. An attacker could potentially harvest personal information or use the compromised profiles for malicious purposes. Furthermore, the manipulation of quiz and poll results could undermine the integrity of these interactive elements, leading to skewed outcomes and a loss of trust in the platform. The number of affected users and the full extent of potential damage is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>While Cisco states that they have addressed this vulnerability and that no customer action is required, monitor web server logs for unusual activity targeting API endpoints related to user profile data or quiz/poll interactions.</li>
<li>Implement the provided Sigma rule <code>Detect Suspicious Slido API Access</code> to identify potential exploitation attempts based on HTTP status codes and URI patterns.</li>
<li>Monitor for unexpected modifications to user profiles or quiz/poll results within the Slido platform&rsquo;s administrative interface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>idor</category><category>cisco</category><category>slido</category><category>credential-access</category></item></channel></rss>