Preview Tool

Cisco Bug: CSCut42422 - Cisco VDS SDP over SIP Denial of Service (DOS) Vulnerability

Last Modified

Dec 14, 2017

Products (3)

  • Cisco TelePresence Video Communication Server (VCS)
  • Cisco TelePresence Video Communication Server Model
  • Cisco Expressway

Known Affected Releases


Description (partial)

A vulnerability in Session Description Protocol (SDP) parser of the Cisco TelePresence Video
Communication Server (VCS) could allow an unauthenticated, remote attacker to cause the VSC 
device to become unreachable due to a denial of service (DoS) attack which causes high CPU utilization.

The vulnerability is due to parsing error of the SDP parameter negotiation request. An attacker could 
exploit this vulnerability by initiating a SDP session over a Session Initiation Protocol (SIP) connection
to the VCS device and sending a crafted SDP parameter negotiation request. An exploit could allow the 
attacker to to take the VCS device offline due to high CPU utilization caused by the DoS attack.

Device running with default configuration running an affected version of software.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.