The patch that wasn't: Cisco emits fresh fixes for NTLM hash-spilling vuln and XSS-RCE combo in Jabber app

Wormable nasty still doesn't need any user input to pwn target devices

A previous patch for Cisco's Jabber chat product did not in fact fix four vulnerabilities – including one remote code execution (RCE) flaw that would allow malicious people to hijack targeted devices by sending a carefully crafted message.

Norwegian infosec biz Watchcom spotted the vulnerabilities, having been asked by a client to verify that a previous patch for CVE-2020-26085 worked as advertised. Instead Watchcom found that the September update didn't fix the underlying problems.

A cross-site scripting (XSS) vuln leading to an RCE, CVE-2020-26085 was rated at 9.9 on the 10-point CVSS v3 scale, falling squarely into the "critical" bracket. It was uncovered by Watchcom in June this year and Cisco issued patches on 2 September that allegedly fixed it, as well as three other vulns.

Referring to the XSS-RCE vuln, Watchcom said in a blog post: "This vulnerability does not require user interaction and is wormable, since the payload is delivered via an instant message. This means that it can be used to automatically spread malware without any user interaction."

Watchcom added: "The patch released in September only patched the specific injection points that Watchcom had identified. The underlying issue was not addressed. We were therefore able to find new injection points that could be used to exploit the vulnerabilities."

The critical vuln is accompanied by two others: CVE-2020-27132 and CVE-2020-27127. These are respectively a password hash-stealing information disclosure flaw and a command injection vuln.

Taken together, the three work by allowing the attacker to escape from the Chromium Embedded Framework sandbox, which is the tech underpinning the video 'n' text-based messaging app. Poorly sanitised input handled by the XMPP protocol, which is implemented as Jabber's text component, allows nasty sorts to execute arbitrary text strings in the name attribute of a file tag of a file sent over XMPP.

By abusing this, said Watchcom, it is possible to "inject arbitrary HTML tags into the file transfer message before sending it."

The NTLM password hash can be collected, Watchcom added, by "sending a message that contains a malicious <img> tag, an attacker can force the victim's Cisco Jabber client to interact with a file share the attacker controls."

"If the file share requires authentication, the victim's NTLM password hash will be sent," said the firm's researchers in a statement. If that password happens to be shorter than eight characters, it is currently child's play to recover the plaintext version.

Cisco sent us a statement:

"Following the release of software fixes on September 2, Cisco and a security researcher independently discovered additional, distinct vulnerabilities through testing. We followed our well-established security vulnerability process to address and disclose these vulnerabilities on December 10. Cisco maintains a very open relationship with the security community, and we view this as vital to helping protect our customers’ networks. We thank the security researchers at Watchcom for reporting the vulnerabilities they discovered."

Admins whose orgs use Cisco Jabber should install the latest patches from Cisco, which are available here. ®

Similar topics

Narrower topics

Other stories you might like

  • Despite global uncertainty, $500m hit doesn't rattle Nvidia execs
    CEO acknowledges impact of war, pandemic but says fundamentals ‘are really good’

    Nvidia is expecting a $500 million hit to its global datacenter and consumer business in the second quarter due to COVID lockdowns in China and Russia's invasion of Ukraine. Despite those and other macroeconomic concerns, executives are still optimistic about future prospects.

    "The full impact and duration of the war in Ukraine and COVID lockdowns in China is difficult to predict. However, the impact of our technology and our market opportunities remain unchanged," said Jensen Huang, Nvidia's CEO and co-founder, during the company's first-quarter earnings call.

    Those two statements might sound a little contradictory, including to some investors, particularly following the stock selloff yesterday after concerns over Russia and China prompted Nvidia to issue lower-than-expected guidance for second-quarter revenue.

    Continue reading
  • Another AI supercomputer from HPE: Champollion lands in France
    That's the second in a week following similar system in Munich also aimed at researchers

    HPE is lifting the lid on a new AI supercomputer – the second this week – aimed at building and training larger machine learning models to underpin research.

    Based at HPE's Center of Excellence in Grenoble, France, the new supercomputer is to be named Champollion after the French scholar who made advances in deciphering Egyptian hieroglyphs in the 19th century. It was built in partnership with Nvidia using AMD-based Apollo computer nodes fitted with Nvidia's A100 GPUs.

    Champollion brings together HPC and purpose-built AI technologies to train machine learning models at scale and unlock results faster, HPE said. HPE already provides HPC and AI resources from its Grenoble facilities for customers, and the broader research community to access, and said it plans to provide access to Champollion for scientists and engineers globally to accelerate testing of their AI models and research.

    Continue reading
  • Workday nearly doubles losses as waves of deals pushed back
    Figures disappoint analysts as SaaSy HR and finance application vendor navigates economic uncertainty

    HR and finance application vendor Workday's CEO, Aneel Bhusri, confirmed deal wins expected for the three-month period ending April 30 were being pushed back until later in 2022.

    The SaaS company boss was speaking as Workday recorded an operating loss of $72.8 million in its first quarter [PDF] of fiscal '23, nearly double the $38.3 million loss recorded for the same period a year earlier. Workday also saw revenue increase to $1.43 billion in the period, up 22 percent year-on-year.

    However, the company increased its revenue guidance for the full financial year. It said revenues would be between $5.537 billion and $5.557 billion, an increase of 22 percent on earlier estimates.

    Continue reading

Biting the hand that feeds IT © 1998–2022