Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Jabber STARTTLS Downgrade Vulnerability

cisco-sa-20151224-jab · Medium · Published · Updated

A vulnerability in the Cisco Jabber client could allow an unauthenticated, remote attacker to perform a STARTTLS downgrade attack. The vulnerability exists because the client does not verify that an Extensible Messaging and Presence Protocol (XMPP) connection has been established with Transport Layer Security (TLS). An attacker could exploit this vulnerability by performing a man-in-the-middle attack to tamper with the XMPP connection and avoid TLS negotiation. A successful exploit could allow the attacker to cause the client to establish a cleartext XMPP connection. Cisco will release software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2015-6409
Cisco Bug IDsCSCux74848, CSCux74895, CSCux74900, CSCux80122, CSCux88529
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:C
Product Names From Source
Cisco Unified Communications Manager IM and Presence Service, Cisco Jabber IM for Android, Cisco Jabber for Windows, Cisco Jabber for Mac, Cisco Jabber for iOS

Related Products

Product CVE Evidence
Cisco Unified Communications Manager IM and Presence Service CVE-2015-6409 Cisco OpenVuln
Cisco Unified Communications Manager CVE-2015-6409 Cisco OpenVuln
Cisco Jabber for iOS CVE-2015-6409 Cisco OpenVuln
Cisco Jabber for Windows CVE-2015-6409 Cisco OpenVuln
Cisco Jabber for Mac CVE-2015-6409 Cisco OpenVuln
Cisco Jabber IM for Android CVE-2015-6409 Cisco OpenVuln
Cisco Jabber CVE-2015-6409 Cisco OpenVuln