Cisco Jabber for Windows 8.x / 9.x / 10.x / 11.0.x / 11.1.x XMPP Connection MitM STARTTLS Downgrade (cisco-sa-20151224-jab)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The version of Cisco Jabber for Windows installed on the remote host
is affected by a man-in-the-middle STARTTLS downgrade vulnerability.

Description :

The version of Cisco Jabber for Windows installed on the remote host
is 8.x, 9.x, 10.x, 11.0.x, or 11.1.x prior to 11.5. It is, therefore,
affected by man-in-the-middle STARTTLS downgrade vulnerability due to
improper checks to ensure the Extensible Messaging and Presence
Protocol (XMPP) connection is established with Transport Layer
Security (TLS). A man-in-the-middle attacker can exploit this to avoid
TLS negotiation, resulting in the client establishing a cleartext XMPP
connection.

See also :

http://www.nessus.org/u?0655aaae
https://tools.cisco.com/bugsearch/bug/CSCuw87419

Solution :

Upgrade to Cisco Jabber for Windows version 11.5 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 87954 ()

Bugtraq ID:

CVE ID: CVE-2015-6409

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now