Security News > 2020 > September > Cisco patches critical, wormable RCE flaw in Cisco Jabber

Cisco has patched four vulnerabilities in its Jabber client for Windows, the most critical of which could allow attackers to achieve remote code execution by sending specially crafted chat messages.
Cisco Jabber is a video conferencing and instant messaging application that's often used within enterprises for internal communication and collaboration.
"To exploit this vulnerability, an attacker must be able to send XMPP messages to end-user systems running Cisco Jabber for Windows. Attackers may require access to the same XMPP domain or another method of access to be able to send messages to clients," Cisco explained.
"As a result of exploitation, an attacker could cause the application to run an arbitrary executable that already exists within the local file path of the application. The executable would run on the end-user system with the privileges of the user who initiated the Cisco Jabber client application."
Watchcom researchers have provided more technical details about the flaw, and pointed out that since the Cisco Jabber supports file transfers, an attacker can initiate a file transfer containing a malicious.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/oknOD-oukxc/
Related news
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks (source)
- Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation (source)
- Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9) (source)
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw (source)
- Patch now: Cisco fixes critical 9.9-rated, make-me-admin bug in Meeting Management (source)
- Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc (source)
- Critical Cisco ISE bug can let attackers run commands as root (source)
- Critical RCE bug in Microsoft Outlook now exploited in attacks (source)