Executive Summary
Summary | |
---|---|
Title | Cisco Small Business SPA514G IP Phones SIP Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20190313-sip | First vendor Publication | 2019-03-13 |
Vendor | Cisco | Last vendor Modification | 2019-03-13 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-sip ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-sip"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJciSp+XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczvfcQAKo6LtL3G6ZrJaygZR3O4EpBVNm +CKouxu0pR6MiEIYZytnnlWxbUV6GnLI2suyqVByEWYFMMNL4BiWXVSVgSC/Vbg15 QZCRBI8oB89y1WKsmi+oFFHLjW9ExAXN0PKiZJ+JkYtlJzw9eu7ghGABjJL7dXfO a9faYF7kD+k4whI9+4nOioayYinljAJRgg3/y7JBlUSsW9dBqLcCSpalQQ5qN98J g4zSooTw/OBd2fJeeY8TKv6zWh9BL+sxS5PS3MHE4VYnBzzFsI0xoAq8naescOcd CVRaJY7GYU0pHIw88uLW71MZ/jKDmwyHLBs98iAJOohZOHmS4DUOVGHSW8QJx7w3 GL+sxONyDK+sSzZkRl9KPOUlprU9h9sjxBDV5Yi2iDecNamizWfwZkCWwTjMuSDV EzJvYPFrfN27rhBwkiXdrVI2t7FxWa0BRU8NDxp3LQZbdaVr+N9dBoHymRwx3qjJ HORruO4XV/N5n59e35ivlRHM6G+OcBCoKonhj448i0VhuRPuOWi8H58KB7QzZs6r UQOiBCa1ZG2qmr1zkVPqYG54alYlxTtgRUYub2bKWdboV33ixjv6v+dyMwJeUKRV rCxsjB0hC4JVQ4ilWKYAUmEpME3ndQM1uoiAUt3HDnFs7qFVD6+jzHmhWEYKSYvP nQXHbv2w8jF7rtl +=iLQB END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 3 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco SPA514G SDP field processing denial of service attempt RuleID : 47426 - Revision : 2 - Type : PROTOCOL-VOIP |
Alert History
Date | Informations |
---|---|
2019-03-14 21:22:04 |
|
2019-03-14 00:21:38 |
|
2019-03-13 21:18:42 |
|