#VU54206 Insufficiently protected credentials in Cisco Systems, Inc products - CVE-2021-1569


Vulnerability identifier: #VU54206

Vulnerability risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-1569

CWE-ID: CWE-522

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco Jabber for Windows
Client/Desktop applications / Messaging software
Cisco Jabber for MacOS
Client/Desktop applications / Messaging software
Cisco Jabber for Android and iOS
Client/Desktop applications / Messaging software

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or gain access to sensitive information.

The vulnerability exists due to improper input validation when processing messages. A remote authenticated attacker can send a specially crafted Extensible Messaging and Presence Protocol (XMPP) message to the affected application and gain access to return sensitive authentication information to another system, which the attacker could use in further attacks.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Cisco Jabber for Windows: before 14.0.1

Cisco Jabber for MacOS: before 14.0.1

Cisco Jabber for Android and iOS: before 14.0.1


External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy20799


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability