Cisco Jabber 11.9


This article provides interoperability between your cloud-based Jabber deployment and Webex. This is different to the interoperability between on-premises Jabber deployments and Webex users (see https://www.cisco.com/go/hybrid-services-message for more on that deployment).

With the Cisco Webex / Jabber Interop setting enabled:

  • People can send or receive messages between Webex and Jabber apps.

  • Jabber users see a status of On Cisco Webex, when their contact is using Webex.

Deployment Requirements

Supported for Cisco Jabber cloud deployments only.

Before you enable this setting, check the following:

  • Your organization must be added to the Cisco Platform identity service. You can check in Cisco Webex Control Hub to see if your organization has been added. If your organization hasn't been added, you can contact the Cisco Customer Support team or your Cisco Customer Success Manager to request that your organization is added to the Cisco Platform identity service. This process to add users to the identity service takes some time to complete.

    For more information on the request process for Cisco Customer Support or Cisco Customer Success Manager, see this support article.

    Cisco Jabber (Webex Messenger) and Webex domains must be identical for the Webex Messenger Org to be synched into the Cisco Platform identity service.

    Cisco Directory Connector must be disabled in Control Hub, as this method of managing users is not compatible with how users are managed in a Jabber cloud deployment.

Cisco Jabber 11.9.3

  • If you use Single Sign On (SSO) for Webex Messenger then you must set up SSO for Cisco Platform identity service. For more information about configuring SSO, see the Cisco Webex Messenger Install and Upgrade documentation.

Known Limitations

  • Users can only send text between Jabber and Webex, sending any other content is not supported.

  • You can only send messages in a space with one person, you can't send messages in group spaces.

  • End-to-end AES encryption is not supported.

  • All users must have the Cisco Webex / Jabber Interop setting enabled.

    When a Jabber user without interop enabled attempts to send a message to an interop enabled user who isn't signed in to Jabber, they receive this message This user is currently offline in Jabber and the message cannot be delivered.

Jabber Requirements

Cisco Jabber for Windows 11.9 Pika-aloitusopas Created Date: 9/14/2017 10:49:07 PM. Jabber 11.9 with Contacts and Without Chat and Presence Hello, we have cucm 11.5 and Jabber 11.9 and we want that som users will use Jabber for CTI without Chat and Presence with Contact Button on Client. Cisco Jabber VDI. The Cisco Jabber application can be used with Citrix or VMWare VDI solution. The different download packages can be found on this page. Download Jabber client; 14.0 Jabber Windows client x86; 12.9 Jabber Windows client x86; 12.8 Jabber Windows client x86; 12.7 Jabber Windows client x86; 12.6 Jabber Windows client x86.

Cisco Jabber clients 11.9 or later.

Ensure the following parameter is set to False in the jabber-config.xml file:<Persistent_Chat_Enabled>False</Persistent_Chat_Enabled>

AES encryption must be disabled in Cisco Webex Messenger Administration Tool (Org Admin). In the Policy Editor tab, disable the Support End-To-End Encryption for IM setting.

Cisco Jabber 11.9

Cisco Webex Control Hub Settings

You can enable the Cisco Webex / Jabber Interop setting in Control Hub for your entire organization and then for specific people. The setting is also available as one of the services to choose in the CSV file user setup.

Set Up Messaging Between Cisco Webex and Jabber for Your Organization

Cisco Jabber 11.9

When your users are in Webex and also in Cisco Jabber, you can use this setting to allow everyone in both apps to communicate with each other.

Cisco Jabber 11.9 End Of Life

1

From the customer view in https://admin.webex.com, go to Services, and then click Message > Webex Messenger.

If you don't see this option, contact the Cisco Customer Support team or your Cisco Customer Success Manager to request that your organization is added to the Cisco Platform identity service. This process to add users to the identity service takes some time to complete.

2

Scroll to Options, click Cisco Webex / Jabber Interop, and then click Save.

Current Description

A vulnerability in the loading mechanism of specific dynamic link libraries in Cisco Jabber for Windows could allow an authenticated, local attacker to perform a DLL preloading attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of the resources loaded by the application at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. The malicious DLL file would execute when the Jabber application launches. A successful exploit could allow the attacker to execute arbitrary code on the target machine with the privileges of another user's account.

Cisco Jabber Download Windows 11.9


Analysis Description

A vulnerability in the loading mechanism of specific dynamic link libraries in Cisco Jabber for Windows could allow an authenticated, local attacker to perform a DLL preloading attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of the resources loaded by the application at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. The malicious DLL file would execute when the Jabber application launches. A successful exploit could allow the attacker to execute arbitrary code on the target machine with the privileges of another user's account.

Severity

CVSS 3.x Severity and Metrics:
Cisco jabber for windows 11.9
NIST:NVD
Vector:Cisco Systems, Inc.
Vector:NVD
Vector:HyperlinkResourcehttp://www.securityfocus.com/bid/109038Third Party AdvisoryVDB Entryhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-jabber-dllVendor Advisory
Jabber

Weakness Enumeration

CWE-IDCWE NameSource
CWE-427Uncontrolled Search Path ElementNIST
CWE-264Permissions, Privileges, and Access ControlsCisco Systems, Inc.

Known Affected Software Configurations Switch to CPE 2.2

Cisco jabber 11.9 end of life

Cisco Jabber Download

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

What Is Cisco Jabber

Change History

5 change records found show changes