Lucene search

K
ciscoCiscoCISCO-SA-20150115-CVE-2015-0579
HistoryJan 15, 2015 - 8:47 p.m.

Cisco TelePresence VCS and Expressway High CPU Utilization Vulnerability

2015-01-1520:47:50
tools.cisco.com
135

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

69.6%

A vulnerability in the SIP code of Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway could allow an unauthenticated, remote attacker to cause high memory consumption and CPU utilization, which could cause some services to become unavailable and degrade performance.

The vulnerability is due to insufficient validation of crafted SIP packets. An attacker could exploit this vulnerability by sending crafted SIP packets to the affected system.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker may need access to trusted, internal networks behind a firewall to send crafted packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscotelepresence_video_communication_serverMatchany
OR
ciscotelepresence_video_communication_serverMatchany
VendorProductVersionCPE
ciscotelepresence_video_communication_serveranycpe:2.3:h:cisco:telepresence_video_communication_server:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

69.6%

Related for CISCO-SA-20150115-CVE-2015-0579