Cisco fixes critical code execution bug in Jabber for Windows

logo

Cisco tackled a crucial severity remote code execution vulnerability that influences numerous variations of its Cisco Jabber for Home windows software program.

Cisco Jabber for Home windows is a desktop application built to provide consumers with presence, instantaneous messaging (IM), cloud messaging, desktop sharing, as properly as audio, movie, and net conferencing.

Olav Sortland Thoresen of Watchcom has learned this vulnerability which has been tracked as CVE-2020-3495. The Cisco Product Safety Incident Reaction Staff (PSIRT) explained that the flaw has not been exploited in the wild.

The stability flaw has a highest 9.9 CVSS base score from Cisco and it is brought about by poor input validation of incoming messages&#8217 contents.

The vulnerability can permit remote attackers to execute arbitrary code on techniques running unpatched Jabber for Windows computer software soon after effective exploitation employing maliciously-crafted Extensible Messaging and Existence Protocol (XMPP) messages.

It does not involve any person conversation for exploiting this flaw, and it can exploit even when the Jabber for Home windows customer is running in the background.

Attackers are expected to have access to their victims&#8217 XMPP domains to send the destructive XMPP messages desired to effectively exploit the vulnerability.

The attackers can also automate the exploitation process to create a worm that can unfold instantly to new units.

As Cisco Jabber supports file transfers, an attacker can initiate a file transfer containing a destructive .exe file and pressure the sufferer to accept it making use of an XSS attack, and then execute the malicious file on a focused target&#8217s device.

Devices with Jabber for Windows configured in phone-only manner and individuals that use other messaging solutions are not vulnerable to exploitation.

The vulnerability also does not have an effect on Cisco Jabber for macOS or cellular platforms, and it impacts all at this time supported versions of the Home windows Cisco Jabber consumer (12.1 to 12.9).

The post Cisco fixes critical code execution bug in Jabber for Home windows to start with appeared on Cybersafe Information.

Resource website link

Read More on latest Security Updates

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *