First published: Wed Mar 24 2021(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | <12.1.5 | |
Cisco Jabber | <12.8.7 | |
Cisco Jabber | <=12.9.0 | |
Cisco Jabber | <=12.9.0 | |
Cisco Jabber | >=12.5.0<12.5.4 | |
Cisco Jabber | >=12.6.0<12.6.5 | |
Cisco Jabber | >=12.7.0<12.7.4 | |
Cisco Jabber | >=12.8.0<12.8.5 | |
Cisco Jabber | >=12.9.0<12.9.5 | |
Cisco Jabber | >=12.9.0<12.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1418 is a vulnerability in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms that could allow an attacker to execute arbitrary programs with elevated privileges, access sensitive information, intercept network traffic, or cause a denial of service.
CVE-2021-1418 impacts Cisco Jabber by allowing an attacker to execute arbitrary programs with elevated privileges, access sensitive information, intercept network traffic, or cause a denial of service.
Cisco Jabber versions 12.1.5 to 12.8.7 for Windows, 12.9.0 for Android and iPhone OS, and 12.5.0 to 12.9.6 for MacOS are affected by CVE-2021-1418.
CVE-2021-1418 has a severity rating of 6.5 (out of 10), which is considered critical.
To fix CVE-2021-1418 in Cisco Jabber, it is recommended to upgrade to a patched version provided by Cisco.