CVE-2015-6409
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
26/12/2015
Last modified:
12/04/2025
Description
Cisco Jabber 10.6.x, 11.0.x, and 11.1.x on Windows allows man-in-the-middle attackers to conduct STARTTLS downgrade attacks and trigger cleartext XMPP sessions via unspecified vectors, aka Bug ID CSCuw87419.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:jabber:10.6\(2\):*:*:*:*:windows:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab
- http://www.securityfocus.com/bid/79678
- http://www.securitytracker.com/id/1034540
- http://www.synacktiv.com/ressources/cisco_jabber_starttls_downgrade.pdf
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab
- http://www.securityfocus.com/bid/79678
- http://www.securitytracker.com/id/1034540
- http://www.synacktiv.com/ressources/cisco_jabber_starttls_downgrade.pdf



