First published: Thu Oct 19 2017(Updated: )
A vulnerability in the web interface of Cisco Jabber for Windows Client could allow an authenticated, local attacker to retrieve user profile information, which could lead to the disclosure of confidential information. The vulnerability is due to a lack of input- and validation-checking mechanisms in the system. An attacker could exploit this vulnerability by issuing specific commands after authenticating to the system. A successful exploit could allow the attacker to view profile information where only certain parameters should be visible. Cisco Bug IDs: CSCve14401.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jabber Server | =11.8\(.4\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12284 is classified as medium, indicating that it could potentially lead to the disclosure of confidential information.
To fix CVE-2017-12284, users should upgrade Cisco Jabber for Windows Client to the latest version provided by Cisco.
CVE-2017-12284 affects users of Cisco Jabber for Windows Client version 11.8(4).
CVE-2017-12284 can lead to the disclosure of user profile information, which may include confidential data.
CVE-2017-12284 is not exploitable remotely as it requires local access by an authenticated attacker.