First published: Fri Sep 04 2020(Updated: )
A vulnerability in Cisco Jabber for Windows software could allow an authenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted messages that contain Universal Naming Convention (UNC) links to a targeted user and convincing the user to follow the provided link. A successful exploit could allow the attacker to cause the application to access a remote system, possibly allowing the attacker to gain access to sensitive information that the attacker could use in additional attacks.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | >=12.1<12.1.3 | |
Cisco Jabber | >=12.5<12.5.2 | |
Cisco Jabber | >=12.6<12.6.3 | |
Cisco Jabber | >=12.7<12.7.2 | |
Cisco Jabber | >=12.8<12.8.3 | |
Cisco Jabber | >=12.9<12.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3537 is a vulnerability in Cisco Jabber for Windows software that allows an authenticated remote attacker to gain access to sensitive information.
CVE-2020-3537 affects Cisco Jabber for Windows versions 12.1 through 12.9.
CVE-2020-3537 has a severity rating of 5.7 (medium).
An attacker could exploit CVE-2020-3537 by sending specially crafted messages.
To fix the CVE-2020-3537 vulnerability, update Cisco Jabber for Windows to a version beyond 12.9.1.