Cisco Bug: CSCut42422 - Cisco VDS SDP over SIP Denial of Service (DOS) Vulnerability
Dec 14, 2017
- Cisco TelePresence Video Communication Server (VCS)
- Cisco TelePresence Video Communication Server Model
- Cisco Expressway
Known Affected Releases
Symptoms: A vulnerability in Session Description Protocol (SDP) parser of the Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause the VSC device to become unreachable due to a denial of service (DoS) attack which causes high CPU utilization. The vulnerability is due to parsing error of the SDP parameter negotiation request. An attacker could exploit this vulnerability by initiating a SDP session over a Session Initiation Protocol (SIP) connection to the VCS device and sending a crafted SDP parameter negotiation request. An exploit could allow the attacker to to take the VCS device offline due to high CPU utilization caused by the DoS attack. Conditions: Device running with default configuration running an affected version of software.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases