Cisco Jabber Client For MacOS XMPP Stanza Smuggling (cisco-sa-jabber-xmpp-Ne9SCM)

medium Nessus Plugin ID 165759


An application on the remote host is missing a vendor-supplied security patch.


According to its self-reported version, Cisco Jabber for MacOS is affected by a stanza smuggling vulnerability due to improper handling of nested XMPP requests. An authenticated, remote attacker can send specially crafted XMPP messages to an affected client causing the client to perform unsafe actions.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwc24382

See Also

Plugin Details

Severity: Medium

ID: 165759

File Name: cisco-sa-jabber-xmpp-Ne9SCM_mac.nasl

Version: 1.3

Type: local

Agent: macosx

Published: 10/7/2022

Updated: 1/26/2023

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Temporal Vector: E:POC/RL:OF/RC:C

CVSS Score Source: CVE-2022-20917


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:jabber

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/5/2022

Vulnerability Publication Date: 10/5/2022

Reference Information

CVE: CVE-2022-20917


CISCO-SA: cisco-sa-jabber-xmpp-Ne9SCM

IAVA: 2022-A-0400

CWE: 668