First published: Tue Dec 23 2014(Updated: )
The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8025 is rated as a medium severity vulnerability.
To mitigate CVE-2014-8025, ensure that network communications are encrypted, ideally using HTTPS.
CVE-2014-8025 can lead to sensitive information disclosure through network sniffing.
CVE-2014-8025 affects the Cisco Jabber Guest API when HTML5 is used.
CVE-2014-8025 can expose sensitive information sent over HTTP GET or POST requests.