ID CVE-2013-1228
Summary Cisco Jabber on Windows does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify the client-server data stream via a crafted certificate, aka Bug ID CSCug30280.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:jabber:-:-:*:*:*:windows:*:*
    cpe:2.3:a:cisco:jabber:-:-:*:*:*:windows:*:*
CVSS
Base: 4.3 (as of 05-03-2014 - 19:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
cisco 20130905 Cisco Jabber for Windows Certificate Validation Vulnerability
Last major update 05-03-2014 - 19:00
Published 06-09-2013 - 11:15
Last modified 05-03-2014 - 19:00
Back to Top