Cisco Jabber Client Found Vulnerable to STARTTLS downgrade attack

  • -

Cisco Jabber Client Found Vulnerable to STARTTLS downgrade attack

Category : CyberSecurity , DataBreach

Researchers at Synacktiv have found that the Cisco Jabber
client is vulnerable to a STARTTLS downgrade attack. The vulnerability
manifests due to a failure to validate if a XMPP connection has been
established over TLS. A man-in-the-middle attacker could exploit this
flaw and tamper with the XMPP connection to avoid TLS negotiation,
causing the client to establish a XMPP connection over cleartext. Cisco
has released a security advisory and updated software to address this
vulnerability.

Article; Cisco


Search

Innovice-IT on Twitter

  1. Bas Eikelenboom
    Bas Eikelenboom: Hoe het UWV zelf arbeidsongeschikt raakte https://t.co/YDOZAP4TLY via @ftm_nl

  2. Bas Eikelenboom
    Bas Eikelenboom: RT @remco_verhoef: Multiple Mirai based bots attacking our honeypots, sending their debug output to the open connection. Weird. #mirai #hon

  3. Bas Eikelenboom
    Bas Eikelenboom: RT @remco_verhoef: Host 78.40.78.118 runs Meterpreter and according to @urlscanio uses domain names hxxps://(incident[.])credit-agricole[.]…

  4. Bas Eikelenboom
    Bas Eikelenboom: RT @remco_verhoef: Old trick to identify masked Nginx or Apache webservers running on Windows (not sure if it works for all versions) is to…

  5. Bas Eikelenboom

Archive

Categories