11/12/2020
13/11/2024
CVE-2020-27132: Cisco Jabber Desktop and Mobile Client Software Vulnerabilities
First published: Fri Dec 11 2020(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|
Cisco Jabber | =12.9\(0\) | |
Cisco Jabber | =12.9\(0\) | |
Cisco Jabber | =12.9\(1\) | |
Cisco Jabber | =12.9\(1\) | |
Cisco Jabber | =12.9\(2\) | |
Cisco Jabber | =12.9\(2\) | |
Cisco Jabber | =12.9\(3\) | |
Cisco Jabber | =12.9\(3\) | |
Cisco Jabber For Mobile Platforms | =12.9\(0\) | |
Cisco Jabber For Mobile Platforms | =12.9\(1\) | |
Cisco Jabber For Mobile Platforms | =12.9\(2\) | |
Cisco Jabber For Mobile Platforms | =12.9\(3\) | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What are the affected platforms for CVE-2020-27132?
The affected platforms for CVE-2020-27132 are Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms.
What is the severity of CVE-2020-27132?
The severity of CVE-2020-27132 is critical with a score of 9.9 out of 10.
How can an attacker exploit CVE-2020-27132?
An attacker can exploit CVE-2020-27132 to execute arbitrary programs on the underlying operating system with elevated privileges or gain access to sensitive information.
How can I fix CVE-2020-27132?
To fix CVE-2020-27132, it is recommended to update to a patched version of Cisco Jabber.
Where can I find more information about CVE-2020-27132?
You can find more information about CVE-2020-27132 on the Cisco Security Advisory page.
- collector/nvd-index
- agent/weakness
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/author
- agent/title
- agent/references
- agent/last-modified-date
- agent/severity
- agent/tags
- agent/description
- agent/first-publish-date
- agent/event
- vendor/cisco
- canonical/cisco jabber
- version/cisco jabber/12.9\(0\)
- version/cisco jabber/12.9\(1\)
- version/cisco jabber/12.9\(2\)
- version/cisco jabber/12.9\(3\)
- canonical/cisco jabber for mobile platforms
- version/cisco jabber for mobile platforms/12.9\(0\)
- version/cisco jabber for mobile platforms/12.9\(1\)
- version/cisco jabber for mobile platforms/12.9\(2\)
- version/cisco jabber for mobile platforms/12.9\(3\)
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203