Multiple vulnerabilities in Cisco Jabber Desktop and Mobile Client



Published: 2021-06-17
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-1569
CVE-2021-1570
CWE-ID CWE-522
CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco Jabber for Windows
Client/Desktop applications / Messaging software

Cisco Jabber for MacOS
Client/Desktop applications / Messaging software

Cisco Jabber for Android and iOS
Client/Desktop applications / Messaging software

Vendor

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Insufficiently protected credentials

EUVDB-ID: #VU54206

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-1569

CWE-ID: CWE-522 - Insufficiently Protected Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or gain access to sensitive information.

The vulnerability exists due to improper input validation when processing messages. A remote authenticated attacker can send a specially crafted Extensible Messaging and Presence Protocol (XMPP) message to the affected application and gain access to return sensitive authentication information to another system, which the attacker could use in further attacks.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Jabber for Windows: before 14.0.1

Cisco Jabber for MacOS: before 14.0.1

Cisco Jabber for Android and iOS: before 14.0.1

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy20799


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU54207

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-1570

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of message content. A remote authenticated attacker can send  specially crafted message to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Jabber for Windows: before 14.0.1

Cisco Jabber for MacOS: before 14.0.1

Cisco Jabber for Android and iOS: before 14.0.1

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy20801


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###