First published: Wed Jun 16 2021(Updated: )
Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for Mac, and Cisco Jabber for mobile platforms could allow an attacker to access sensitive information or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG
Credit: CVE-2021-1569 Watchcom for reporting these vulnerabilitiesCVE-2021-1570: Torjus Bryne Retterstøl Watchcom for reporting these vulnerabilitiesCVE-2021-1570: Cisco would also like to thank Rob Vinson for independently reporting this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Jabber Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-jabber-GuC5mLwG is classified as high due to the potential for information disclosure and denial of service.
To fix cisco-sa-jabber-GuC5mLwG, you should update Cisco Jabber on all affected platforms to the latest version provided by Cisco.
cisco-sa-jabber-GuC5mLwG affects Cisco Jabber for Windows, Mac, and mobile platforms.
cisco-sa-jabber-GuC5mLwG details vulnerabilities that could enable unauthorized access to sensitive information or trigger a denial of service condition.
There are currently no effective workarounds for cisco-sa-jabber-GuC5mLwG, so the best course of action is to apply the available updates.