First published: Wed Jun 24 2015(Updated: )
The web-based user interface in Cisco Jabber through 9.6(3) and 9.7 through 9.7(5) on Windows allows remote attackers to obtain sensitive information via a crafted value in a GET request, aka Bug IDs CSCuu65622 and CSCuu70858.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber for Windows | =9.6\(0\) | |
Cisco Jabber for Windows | =9.6\(1\) | |
Cisco Jabber for Windows | =9.6\(2\) | |
Cisco Jabber for Windows | =9.6\(3\) | |
Cisco Jabber for Windows | =9.7\(0\) | |
Cisco Jabber for Windows | =9.7\(1\) | |
Cisco Jabber for Windows | =9.7\(2\) | |
Cisco Jabber for Windows | =9.7\(3\) | |
Cisco Jabber for Windows | =9.7\(4\) | |
Cisco Jabber for Windows | =9.7\(5\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4218 has a medium severity rating due to its potential for information disclosure.
To remediate CVE-2015-4218, upgrade to a non-vulnerable version of Cisco Jabber beyond 9.7(5).
The impact of CVE-2015-4218 allows remote attackers to obtain sensitive information through manipulated GET requests.
CVE-2015-4218 affects Cisco Jabber versions 9.6(0) to 9.7(5) on Windows.
Yes, CVE-2015-4218 can be exploited by remote attackers.