First published: Wed Mar 24 2021(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | <12.1.5 | |
Cisco Jabber | <12.8.7 | |
Cisco Jabber | <=12.9.0 | |
Cisco Jabber | <=12.9.0 | |
Cisco Jabber | >=12.5.0<12.5.4 | |
Cisco Jabber | >=12.6.0<12.6.5 | |
Cisco Jabber | >=12.7.0<12.7.4 | |
Cisco Jabber | >=12.8.0<12.8.5 | |
Cisco Jabber | >=12.9.0<12.9.5 | |
Cisco Jabber | >=12.9.0<12.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1471 is a vulnerability in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms that could allow an attacker to execute arbitrary programs with elevated privileges.
Versions up to 12.1.5 for Windows, up to 12.8.7 for MacOS, up to 12.9.0 for Android, and up to 12.9.0 for iPhone OS are affected.
CVE-2021-1471 has a severity rating of 5.6, which is considered critical.
An attacker can exploit CVE-2021-1471 by executing arbitrary programs on the underlying operating system with elevated privileges.
Yes, Cisco has released software updates to address the vulnerability. It is recommended to update to the latest version of Cisco Jabber.