First published: Mon May 22 2017(Updated: )
A vulnerability in the Session Initiation Protocol (SIP) implementation of Cisco IP Phone 8851 11.0(0.1) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to an abnormal SIP message. An attacker could exploit this vulnerability by manipulating the CANCEL packet. An exploit could allow the attacker to cause a disruption of service to the phone. Cisco Bug IDs: CSCvc34795.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Phone 8800 Series Firmware | =11.0\(0.1\) | |
Cisco IP Phone 8851 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6630 is categorized as a high severity vulnerability due to its potential to cause a denial of service (DoS).
To mitigate CVE-2017-6630, upgrade to a patched version of Cisco IP Phone firmware that addresses this vulnerability.
CVE-2017-6630 specifically affects Cisco IP Phone 8851 running firmware version 11.0(0.1).
Yes, an unauthenticated remote attacker can exploit CVE-2017-6630 to cause a denial of service condition.
CVE-2017-6630 is caused by the processing of an abnormal SIP message in the Session Initiation Protocol implementation.