First published: Fri Dec 11 2020(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | =12.9\(0\) | |
Cisco Jabber | =12.9\(0\) | |
Cisco Jabber | =12.9\(1\) | |
Cisco Jabber | =12.9\(1\) | |
Cisco Jabber | =12.9\(2\) | |
Cisco Jabber | =12.9\(2\) | |
Cisco Jabber | =12.9\(3\) | |
Cisco Jabber | =12.9\(3\) | |
Cisco Jabber For Mobile Platforms | =12.9\(0\) | |
Cisco Jabber For Mobile Platforms | =12.9\(1\) | |
Cisco Jabber For Mobile Platforms | =12.9\(2\) | |
Cisco Jabber For Mobile Platforms | =12.9\(3\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected software versions for CVE-2020-27127 are Cisco Jabber 12.9(0) on macOS and Windows, Cisco Jabber 12.9(1) on macOS and Windows, Cisco Jabber 12.9(2) on macOS and Windows, Cisco Jabber 12.9(3) on macOS and Windows, and Cisco Jabber for Mobile Platforms 12.9(0), 12.9(1), 12.9(2), and 12.9(3).
The severity rating for CVE-2020-27127 is critical, with a severity value of 9.9.
An attacker can execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information.
To mitigate the vulnerabilities in Cisco Jabber, it is recommended to upgrade to a fixed software release.
More information about CVE-2020-27127 can be found on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO