Executive Summary
Summary | |
---|---|
Title | Cisco Unified Customer Voice Portal Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20180117-cvp | First vendor Publication | 2018-01-17 |
Vendor | Cisco | Last vendor Modification | 2018-01-17 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the application server of the Cisco Unified Customer Voice Portal (CVP) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to malformed SIP INVITE traffic received on the CVP during communications with the Cisco Virtualized Voice Browser (VVB). An attacker could exploit this vulnerability by sending malformed SIP INVITE traffic to the targeted appliance. An exploit could allow the attacker to impact the availability of services and data on the device, causing a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cvp ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cvp"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJaX3REXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczOL4P/AwSo/HoL82/k5EFB8kRESCItHZH YagJ5HzfC+GHk2L468e4yQF9F6i58psRegPQINeGZM8HYJbqXWbhkrAcXBOR9MQy q2bdOBX0yhifWXLnlEXCw1TP9TxE9LBjKBu3fMqTn8w952R1yOvEoBqaxD3sklY0 QRNEy34foQJa1gCA3vXHM7+49x5NjELtcN2zzU5A5rMxSaEMgbf2Mn+qrbrOfMnR Tyu/0v3OgJA+SG5zetrd4B83tAprITbQLVGguR3MOQ0RSaACOlk6BWLXC41bVbY/ H5w91h1aBcvX3u6v2JYGNJNXKuvnCHPMzjmLZaGkCkF+KaW3Vj4wt2PbvMtfjX4e VyLyO79qu4D7M8LRksOCXx+a1jyGjC4zC4rLvLRVzqseIF46RCpHm7PQue9O0Vt3 2lkyHVjLqhs2ulu2umafpkgdVy+CgYlfXgXkos8y12UJ4Oo+ybN4keVNvQP4Gys8 6tbjAvvN7u8ANMfex8YGAf4SQr6iD66nbP8ajrYgUCAiH+TDShd4dPs2og7qyUNb GvY9zFIKjc7mye0Oxd/oF6qRvgPs29OnvYdlklUEPRgUiXYl6YNY1htauEHXbVMa n5xFhNxvoto8uqtPjvNHYLzCRpMYNSRT0KR6u55PcYtYcE8MgpfDjM0R0AKQcUat PO7VgkSuZaCIFTmK =gqZZ END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-01-18 | Cisco Unified Customer Voice Portal denial of service attempt RuleID : 45464 - Revision : 1 - Type : PROTOCOL-VOIP |
Alert History
Date | Informations |
---|---|
2018-02-06 17:21:42 |
|
2018-01-18 12:10:36 |
|
2018-01-17 17:19:57 |
|