First published: Fri Sep 06 2013(Updated: )
Cisco Jabber on Windows does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify the client-server data stream via a crafted certificate, aka Bug ID CSCug30280.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber for Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1228 is classified as a high severity vulnerability due to its potential for exploitation by man-in-the-middle attacks.
To fix CVE-2013-1228, ensure that you are using the latest version of Cisco Jabber that includes the security patch addressing SSL certificate validation.
CVE-2013-1228 can be exploited for man-in-the-middle attacks, allowing attackers to intercept and modify communications.
CVE-2013-1228 affects Cisco Jabber on Windows platforms.
The impact of CVE-2013-1228 on users is the risk of data being intercepted and manipulated through unverified SSL connections.