First published: Mon Dec 26 2016(Updated: )
A vulnerability in the Cisco Jabber Guest Server could allow an unauthenticated, remote attacker to initiate connections to arbitrary hosts. More Information: CSCvc31635. Known Affected Releases: 10.6(9). Known Fixed Releases: 11.0(0).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | =10.0.0 | |
Cisco Jabber | =10.0.2 | |
Cisco Jabber | =10.5.0 | |
Cisco Jabber | =10.6.8 | |
Cisco Jabber | =10.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9224 is classified as a high severity vulnerability due to its potential to allow unauthenticated remote access.
To fix CVE-2016-9224, you should upgrade Cisco Jabber Guest to a fixed release, such as version 11.0(0) or later.
CVE-2016-9224 affects Cisco Jabber Guest versions 10.0.0, 10.0.2, 10.5.0, 10.6.8, and 10.6.9.
No, CVE-2016-9224 can be exploited by unauthenticated users, making it more critical.
CVE-2016-9224 allows an unauthenticated attacker to initiate connections to arbitrary hosts.