First published: Thu Oct 19 2017(Updated: )
A vulnerability in the web interface of Cisco Jabber could allow an authenticated, local attacker to retrieve user profile information from the affected software, which could lead to the disclosure of confidential information. The vulnerability is due to a lack of input and validation checks in the affected software. An attacker could exploit this vulnerability by authenticating locally to an affected system and then issuing specific commands to the affected software. A successful exploit could allow the attacker to view all profile information for a user instead of only certain Jabber parameters that should be visible. This vulnerability affects all releases of Cisco Jabber prior to Release 1.9.31. Cisco Bug IDs: CSCve52418.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber for Windows | =1.9.30 | |
Cisco Webex Meetings | =1.9.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12286 is considered a medium-severity vulnerability due to its potential to disclose user profile information.
To fix CVE-2017-12286, users should update to the latest version of Cisco Jabber or Cisco WebEx Meeting Center.
Users of Cisco Jabber version 1.9.30 and Cisco WebEx Meeting Center version 1.9.26 are affected by CVE-2017-12286.
The potential impact of CVE-2017-12286 includes the unauthorized retrieval of confidential user profile information.
CVE-2017-12286 is not remotely exploitable as it requires an authenticated, local attacker to exploit the vulnerability.