Security News > 2020 > September > Cisco Patches Critical Vulnerability in Jabber for Windows

Cisco Patches Critical Vulnerability in Jabber for Windows
2020-09-07 14:22

Cisco last week released patches to address a critical remote code execution vulnerability in Jabber for Windows.

"Cisco Jabber uses XHTML-IM by default for all messages. A malicious message can therefore easily be created by intercepting an XMPP message sent by the application and modifying it. Attackers can do this manually on their own machine or it can be automated to create a worm that spreads automatically," the company continues.

An attacker looking to exploit the vulnerability needs to send XMPP messages to PCs running Jabber for Windows, and may require access to "The same XMPP domain or another method of access to be able to send messages to clients," the tech company explains.

Exploitation is not possible when Jabber is configured to use other messaging services than XMPP. The tech company also released patches to address a high-severity remote command execution flaw in the application protocol handling features of Jabber for Windows, which exists due to improper handling of input to the application protocol handlers.

To exploit the vulnerability, an attacker would need to trick a user "To click a link designed to send malicious content to the Cisco Jabber application."


News URL

http://feedproxy.google.com/~r/Securityweek/~3/hfXeEOANweQ/cisco-patches-critical-vulnerability-jabber-windows

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Cisco 2046 21 1773 1669 288 3751