9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
61.2%
According to its self-reported version, Cisco Jabber is affected by multiple vulnerabilities which could allow a remote, authenticated attacker to execute arbitrary programs on the underlying operating system with elevated privileges or gain access to sensitive information.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
##
# (C) Tenable Network Security, Inc.
##
include('compat.inc');
if (description)
{
script_id(144279);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/12/18");
script_cve_id(
"CVE-2020-26085",
"CVE-2020-27127",
"CVE-2020-27132",
"CVE-2020-27133",
"CVE-2020-27134"
);
script_xref(name:"CISCO-BUG-ID", value:"CSCvv88490");
script_xref(name:"CISCO-BUG-ID", value:"CSCvv88491");
script_xref(name:"CISCO-BUG-ID", value:"CSCvv88492");
script_xref(name:"CISCO-BUG-ID", value:"CSCvw38030");
script_xref(name:"CISCO-BUG-ID", value:"CSCvw39224");
script_xref(name:"CISCO-SA", value:"cisco-sa-jabber-ZktzjpgO");
script_xref(name:"IAVA", value:"2020-A-0578");
script_name(english:"Cisco Jabber for Windows Multiple Vulnerbilities (cisco-sa-jabber-ZktzjpgO)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Jabber is affected by multiple vulnerabilities which could allow a
remote, authenticated attacker to execute arbitrary programs on the underlying operating system with elevated
privileges or gain access to sensitive information.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-ZktzjpgO
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6e836296");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv88490");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv88491");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv88492");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw38030");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw39224");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in the relevant Cisco Security Advisory");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-27134");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/09/02");
script_set_attribute(attribute:"patch_publication_date", value:"2020/09/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/12/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:jabber");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_jabber_client_installed.nbin");
script_require_keys("installed_sw/Cisco Jabber for Windows", "SMB/Registry/Enumerated");
exit(0);
}
include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
app_info = vcf::get_app_info(app:'Cisco Jabber for Windows', win_local:TRUE);
constraints = [
{ 'min_version' : '0.0 ', 'fixed_version' : '12.1.4'},
{ 'min_version' : '12.5 ', 'fixed_version' : '12.5.3'},
{ 'min_version' : '12.6 ', 'fixed_version' : '12.6.4'},
{ 'min_version' : '12.7 ', 'fixed_version' : '12.7.3'},
{ 'min_version' : '12.8 ', 'fixed_version' : '12.8.4'},
{ 'min_version' : '12.9 ', 'fixed_version' : '12.9.3'}
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE
);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26085
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27127
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27132
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27133
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27134
www.nessus.org/u?6e836296
bst.cloudapps.cisco.com/bugsearch/bug/CSCvv88490
bst.cloudapps.cisco.com/bugsearch/bug/CSCvv88491
bst.cloudapps.cisco.com/bugsearch/bug/CSCvv88492
bst.cloudapps.cisco.com/bugsearch/bug/CSCvw38030
bst.cloudapps.cisco.com/bugsearch/bug/CSCvw39224
9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
61.2%