### [CVE-2015-6409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6409) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Cisco Jabber 10.6.x, 11.0.x, and 11.1.x on Windows allows man-in-the-middle attackers to conduct STARTTLS downgrade attacks and trigger cleartext XMPP sessions via unspecified vectors, aka Bug ID CSCuw87419. ### POC #### Reference - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab #### Github No PoCs found on GitHub currently.