CVE-2020-3537
Cisco Jabber for Windows Universal Naming Convention Link Handling Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in Cisco Jabber for Windows software could allow an authenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted messages that contain Universal Naming Convention (UNC) links to a targeted user and convincing the user to follow the provided link. A successful exploit could allow the attacker to cause the application to access a remote system, possibly allowing the attacker to gain access to sensitive information that the attacker could use in additional attacks.
Una vulnerabilidad en el software Cisco Jabber para Windows podría permitir a un atacante remoto autenticado conseguir acceso a información confidencial. La vulnerabilidad es debido a una comprobación inapropiada de los contenidos de mensaje. Un atacante podría explotar esta vulnerabilidad mediante el envío de mensajes especialmente diseñados que contengan enlaces Universal Naming Convention (UNC) hacia un usuario apuntado y convenciendo al usuario de seguir el vínculo proporcionado. Una explotación con éxito podría permitir al atacante causar que la aplicación acceda a un sistema remoto, permitiendo posiblemente al atacante conseguir acceso a información confidencial que el atacante podría usar en ataques adicionales
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2019-12-12 CVE Reserved
- 2020-09-04 CVE Published
- 2024-10-14 EPSS Updated
- 2024-11-13 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-G3NSjPn7 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | >= 12.1 < 12.1.3 Search vendor "Cisco" for product "Jabber" and version " >= 12.1 < 12.1.3" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | >= 12.5 < 12.5.2 Search vendor "Cisco" for product "Jabber" and version " >= 12.5 < 12.5.2" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | >= 12.6 < 12.6.3 Search vendor "Cisco" for product "Jabber" and version " >= 12.6 < 12.6.3" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | >= 12.7 < 12.7.2 Search vendor "Cisco" for product "Jabber" and version " >= 12.7 < 12.7.2" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | >= 12.8 < 12.8.3 Search vendor "Cisco" for product "Jabber" and version " >= 12.8 < 12.8.3" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | >= 12.9 < 12.9.1 Search vendor "Cisco" for product "Jabber" and version " >= 12.9 < 12.9.1" | windows |
Affected
|