4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
43.8%
According to its self-reported version, Cisco Jabber for Windows is affected by multiple vulnerabilities:
A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attacker to access sensitive information. This vulnerability is due to improper validation of message content. An attacker could exploit this vulnerability by sending crafted Extensible Messaging and Presence Protocol (XMPP) messages to an affected system.
A successful exploit could allow the attacker to cause the application to return sensitive authentication information to another system, which the attacker could use in further attacks. (CVE-2021-1569)
A vulnerability in Cisco Jabber for Windows, Cisco Jabber for Mac, and Cisco Jabber for mobile platforms could allow an authenticated, remote attacker to cause a DoS condition. This vulnerability is due to improper validation of message content. An attacker could exploit this vulnerability by sending crafted XMPP messages to an affected system.
A successful exploit could allow the attacker to cause the application to terminate, resulting in a DoS condition.
Please see the included Cisco Security Advisory for more information.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(150861);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/10/11");
script_cve_id("CVE-2021-1569", "CVE-2021-1570");
script_xref(name:"CISCO-SA", value:"cisco-sa-jabber-GuC5mLwG");
script_xref(name:"IAVA", value:"2021-A-0291-S");
script_name(english:"Cisco Jabber for Windows < 14.0.1 Multiple Vulnerabilities (cisco-sa-jabber-GuC5mLwG)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Jabber for Windows is affected by multiple vulnerabilities:
- A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attacker to access sensitive
information. This vulnerability is due to improper validation of message content. An attacker could exploit this
vulnerability by sending crafted Extensible Messaging and Presence Protocol (XMPP) messages to an affected system.
A successful exploit could allow the attacker to cause the application to return sensitive authentication
information to another system, which the attacker could use in further attacks. (CVE-2021-1569)
- A vulnerability in Cisco Jabber for Windows, Cisco Jabber for Mac, and Cisco Jabber for mobile platforms could allow
an authenticated, remote attacker to cause a DoS condition. This vulnerability is due to improper validation of
message content. An attacker could exploit this vulnerability by sending crafted XMPP messages to an affected system.
A successful exploit could allow the attacker to cause the application to terminate, resulting in a DoS condition.
Please see the included Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-GuC5mLwG
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ab01e1dd");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in the relevant Cisco Security Advisory");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-1569");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/06/16");
script_set_attribute(attribute:"patch_publication_date", value:"2021/06/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/06/18");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:jabber");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_jabber_client_installed.nbin");
script_require_ports("installed_sw/Cisco Jabber for Windows");
exit(0);
}
include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
var app_info = vcf::get_app_info(app:'Cisco Jabber for Windows', win_local:TRUE);
var constraints = [
{ 'fixed_version' : '14.0.1'}
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_WARNING
);
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
43.8%