Lucene search

K
kasperskyKaspersky LabKLA12057
HistorySep 02, 2020 - 12:00 a.m.

KLA12057 Multiple vulnerabilities in Cisco Jabber

2020-09-0200:00:00
Kaspersky Lab
threats.kaspersky.com
17

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.9%

Multiple vulnerabilities were found in Cisco Jabber. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. OSI vulnerability in Cisco Jabber can be exploited remotely via special crafted message to obtain sensitive information.
  2. An code execution vulnerability in Cisco Jabber can be exploited remotely via special crafted XMPP to execute arbitrary code.
  3. A command injection vulnerability in the application protocol handling features can be exploited remotely to execute arbitrary code.

Original advisories

Cisco Jabber for Windows Universal Naming Convention Link Handling Vulnerability

Cisco Jabber for Windows Message Handling Arbitrary Code Execution Vulnerability

Cisco Jabber for Windows Protocol Handler Command Injection Vulnerability

Cisco Jabber for Windows Information Disclosure Vulnerability

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Cisco-Jabber

CVE list

CVE-2020-3537 high

CVE-2020-3495 critical

CVE-2020-3498 high

CVE-2020-3430 critical

Solution

Update to the latest version

Download Cisco Jabber

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Cisco Jabber 12.1 earlier than 12.1.3Cisco Jabber 12.5 earlier than 12.5.2Cisco Jabber 12.6 earlier than 12.6.3Cisco Jabber 12.7 earlier than 12.7.2Cisco Jabber 12.8 earlier than 12.8.3Cisco Jabber 12.9 earlier than 12.9.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.9%