Cisco Jabber Extensible Communications Platform and Cisco Unified Presence contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service vulnerability. Updates are available.
Cisco Jabber Extensible Communications Platform (Jabber XCP) and Cisco Unified Presence contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system.
An unauthenticated, remote attacker can exploit the vulnerability by sending malicious XML content to an affected system. If successful, the attacker could trigger the exhaustion of resources, leading to a temporary DoS condition. Repeated attacks could result in a sustained DoS condition, disrupting normal operations for users.
Functional exploit code is publicly available.
Cisco has confirmed this vulnerability in a security advisory and has issued updated software.
The following products are vulnerable:
Cisco Unified Presence software versions prior to 8.5(4)
Jabber XCP software versions prior to 22.214.171.124581 and prior to 126.96.36.199561
It is likely that an attacker would need to have access to an internal, private network to successfully exploit this vulnerability. This requirement could limit the possibility of a successful attack.
Successful exploitation could allow an unauthenticated, remote attacker to cause a DoS condition on an affected server by exhausting available system resources. Repeated exploits could result in a sustained DoS condition, disrupting normal operations for users for longer durations.
The vulnerability is due to the parsing of XML data in both Jabber XCP, including JabberNow appliances, and Cisco Unified Presence. These products are vulnerable to the Exponential Entity Expansion attack. This attack is better known as an XML Bomb, referring to an XML document that is considered to be valid by the rules of the XML schema, but causes the parser or underlying server to crash or hang. This attack is also more commonly referred to the Billion Laughs Attack, due to the use of XML parsers to expand the string lol or ha up to a billion times or until server resources were exhausted.
This attack combines certain properties of XML to create valid but malicious XML using an extreme level of nested substitutions. When the XML parser attempts to expand all the nested entities, it will exhaust all the server resources.
An unauthenticated, remote attacker could trigger high CPU and memory usage from the XML parsers in Jabber XCP, including JabberNow appliances, and Cisco Unified Presence. This will result in the exhaustion of resources, causing processes to crash. This attack affects both client-to-server connections as well as server-to-server (federation) links.
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.
Administrators are advised to monitor affected systems.
Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco. Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at firstname.lastname@example.org.
Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the
Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service.
This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.