Lucene search

K
ciscoCiscoCISCO-SA-20170215-CMS1
HistoryFeb 15, 2017 - 4:00 p.m.

Cisco Meeting Server HTTP Packet Processing Vulnerability

2017-02-1516:00:00
tools.cisco.com
11

0.002 Low

EPSS

Percentile

54.0%

A vulnerability in the Web Bridge interface of the Cisco Meeting Server (CMS), formerly Acano Conferencing Server, could allow an authenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. In addition, the attacker could potentially cause the application to crash unexpectedly, resulting in a denial of service (DoS) condition. The attacker would need to be authenticated and have a valid session with the Web Bridge.

The vulnerability is due to insufficient input validation of an HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP packet to a targeted application. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information or cause a DoS condition.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms1[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms1”]

Affected configurations

Vulners
Node
ciscomeeting_serverMatchany
OR
ciscomeeting_serverMatchany

0.002 Low

EPSS

Percentile

54.0%

Related for CISCO-SA-20170215-CMS1