First published: Fri Dec 11 2020(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | =12.9\(0\) | |
Cisco Jabber | =12.9\(0\) | |
Cisco Jabber | =12.9\(1\) | |
Cisco Jabber | =12.9\(1\) | |
Cisco Jabber | =12.9\(2\) | |
Cisco Jabber | =12.9\(2\) | |
Cisco Jabber | =12.9\(3\) | |
Cisco Jabber | =12.9\(3\) | |
Cisco Jabber For Mobile Platforms | =12.9\(0\) | |
Cisco Jabber For Mobile Platforms | =12.9\(1\) | |
Cisco Jabber For Mobile Platforms | =12.9\(2\) | |
Cisco Jabber For Mobile Platforms | =12.9\(3\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27133 is a vulnerability in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms that allows an attacker to execute arbitrary programs with elevated privileges or gain access to sensitive information.
CVE-2020-27133 has a severity rating of 9.9, which is considered critical.
CVE-2020-27133 affects the following versions of Cisco Jabber: 12.9(0), 12.9(1), 12.9(2), and 12.9(3).
To fix CVE-2020-27133, it is recommended to upgrade to a fixed version of Cisco Jabber.
You can find more information about CVE-2020-27133 in the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO.