First published: Fri Sep 04 2020(Updated: )
A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | >=12.1<12.1.3 | |
Cisco Jabber | >=12.5<12.5.2 | |
Cisco Jabber | >=12.6<12.6.3 | |
Cisco Jabber | >=12.7<12.7.2 | |
Cisco Jabber | >=12.8<12.8.3 | |
Cisco Jabber | >=12.9<12.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3430 is a vulnerability in Cisco Jabber for Windows that could allow an unauthenticated, remote attacker to execute arbitrary commands.
CVE-2020-3430 affects Cisco Jabber for Windows versions 12.1 to 12.9 and could allow an unauthenticated, remote attacker to execute arbitrary commands.
CVE-2020-3430 has a severity rating of 8.8 (Critical).
To fix CVE-2020-3430, users should upgrade to a version of Cisco Jabber for Windows that is not affected by the vulnerability.
More information about CVE-2020-3430 can be found on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-vY8M4KGB