Cisco Jabber for Windows STARTTLS downgrade Vulnerability (CVE-2015-6409)
Cisco Jabber for Windows STARTTLS downgrade Vulnerability (CVE-2015-6409)
Release date:
Updated on:
Affected Systems:
Cisco Jabber for Windows 11.1.x
Cisco Jabber for Windows 11.0.x
Cisco Jabber for Windows 10.6.x
Description:
CVE (CAN) ID: CVE-2015-6409
Cisco Jabber for Windows is a Unified Communication and collaborative work application.
The Send Screen Capture function of Cisco Jabber for Windows has a security vulnerability that allows unauthenticated remote attackers to perform the STARTTLS Downgrade Attack. The client has not verified whether an XMPP connection has been established with TLS. Attackers can use man-in-the-middle attacks to corrupt XMPP connections and avoid TLS negotiation. Attackers can establish plain-text XMPP connections on the client.
<* Source: Cisco
Link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab
*>
Suggestion:
Vendor patch:
Cisco
-----
Cisco has released a Security Bulletin (cisco-sa-20151224-jab) and patches for this:
Cisco-sa-20151224-jab: Cisco Jabber for Windows STARTTLS Downgrade Vulnerability
Link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab
This article permanently updates the link address: