First published: Wed Jan 06 2021(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | <12.1.4 | |
Cisco Jabber | <12.8.5 | |
Cisco Jabber | <12.9.4 | |
Cisco Jabber | <12.9.4 | |
Cisco Jabber | >=12.5<12.5.3 | |
Cisco Jabber | >=12.6<12.6.4 | |
Cisco Jabber | >=12.7<12.7.3 | |
Cisco Jabber | >=12.8<12.8.4 | |
Cisco Jabber | >=12.9<12.9.3 | |
Cisco Jabber | >=12.9<12.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information.
The severity of CVE-2020-26085 is critical with a CVSS score of 9.9.
Cisco Jabber versions 12.1.4 up to but excluding 12.8.5 for Windows, versions 12.9.4 up to but excluding 12.9.4 for MacOS, versions 12.9.4 up to but excluding 12.9.4 for Android, and versions 12.9.4 up to but excluding 12.9.4 for iPhone OS are affected by CVE-2020-26085.
An attacker can exploit CVE-2020-26085 to execute arbitrary programs on the underlying operating system with elevated privileges or gain access to sensitive information.
You can find more information about CVE-2020-26085 on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO