First published: Sat Dec 26 2015(Updated: )
Cisco Jabber 10.6.x, 11.0.x, and 11.1.x on Windows allows man-in-the-middle attackers to conduct STARTTLS downgrade attacks and trigger cleartext XMPP sessions via unspecified vectors, aka Bug ID CSCuw87419.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jabber Server | =10.6\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6409 is considered a medium severity vulnerability due to its potential for man-in-the-middle attacks.
To mitigate CVE-2015-6409, upgrade Cisco Jabber to the latest version where the vulnerability has been patched.
CVE-2015-6409 allows attackers to conduct STARTTLS downgrade attacks resulting in cleartext XMPP sessions.
CVE-2015-6409 affects Cisco Jabber versions 10.6.x, 11.0.x, and 11.1.x on Windows.
Exploitation of CVE-2015-6409 requires access to the network where the vulnerable Cisco Jabber client resides, making it moderately challenging.