Lucene search

K
ciscoCiscoCISCO-SA-CMS-SEGFAULT-G6ES4VE8
HistoryNov 01, 2023 - 4:00 p.m.

Cisco Meeting Server Web Bridge Denial of Service Vulnerability

2023-11-0116:00:00
tools.cisco.com
8
cisco
meeting server
web bridge
denial of service
vulnerability
api
remote attacker
dos condition
http requests
crafted packets
software updates

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

A vulnerability in an API of the Web Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

This vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause a partial availability condition, which could cause ongoing video calls to be dropped due to the invalid packets reaching the Web Bridge.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-segfault-G6ES4Ve8 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-segfault-G6ES4Ve8”]

Affected configurations

Vulners
Node
ciscomeeting_serverMatchany
OR
ciscomeeting_serverMatchany

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

Related for CISCO-SA-CMS-SEGFAULT-G6ES4VE8