Cisco owns up to man-in-the-middle vulnerability in chat client

By
Follow google news

Organisations urged to patch Jabber immediately.

Californian tech giant Cisco has released a statement warning its chat client Jabbar is currently vulnerable to a man-in-the-middle attack.

Cisco owns up to man-in-the-middle vulnerability in chat client

Found in the Windows client of Jabber, the vulnerability could allow an unauthenticated, remote attacker to perform a STARTTLS downgrade attack.

Discovered by Renaud Dubourguais and Sébastien Dudek from Synacktiv, a French cyber-security firm, versions affected include the 10.6.x, 11.0.x, and 11.1.x releases.

Currently the client does not verify that the Extensible Messaging and Presence Protocol (XMPP) connection has been established with Transport Layer Security (TLS).

XMPP enables the near-real-time exchange of structured yet extensible data between any two or more network entities.

“Cisco Jabber is installed on an employee's computer and configured to connect to a Jabber server deployed by the company.

"During the connection process, a XMPP negotiation occurs to decide if they have to use a secured communication (TLS) or not which is where the vulnerability is. Once the negotiation is done, the client sends the company login details through XMPP messages to authenticate the employee and chats can start," Dubourguais explained to SCMagazineUK.com.

This means that subsequently, the attacker could cause the client to establish a plaintext XMPP connection.

A report from Synacktiv warned “a successful exploitation could allow anyone to wiretap communications, steal user credentials, but also tamper messages sent between the client and the Jabber gateway.”

Cisco has released software updates that address this vulnerability, but as there are currently no workarounds available, the only way to make sure end users are protected would be to make sure their Jabber client is fully patched and up to date.

Gavin Millard, chief technical officer EMEA at Tenable Network Security said, “to finish off the year of multiple downgrade attacks against SSL/TLS, the recently announced Cisco Jabber client issue is similar to many we've experienced in 2015. 

"As with many of the downgrade vulnerabilities, an attacker could manipulate the communication path to force a lower level of encryption between the client and server, making it easier to gain visibility into the data flow.

"What is of concern in this particular example though, is the fact the downgrade is to cleartext rather than a less secure implementation of SSL.” 

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

National photo licence recognition system set to go live in 2025

National photo licence recognition system set to go live in 2025

Hackers using F5 devices to target US gov networks

Hackers using F5 devices to target US gov networks

Australia's new cyber affairs ambassador sourced from ASD

Australia's new cyber affairs ambassador sourced from ASD

Austrade to replace its data centre core network

Austrade to replace its data centre core network

Log In

  |  Forgot your password?