First published: Wed Aug 16 2017(Updated: )
A vulnerability in the Session Initiation Protocol (SIP) on the Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the targeted appliance. The vulnerability is due to excessive SIP traffic sent to the device. An attacker could exploit this vulnerability by transmitting large volumes of SIP traffic to the VCS. An exploit could allow the attacker to cause a complete DoS condition on the targeted system. Cisco Bug IDs: CSCve32897.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tandberg Video Communication Server | =x8.7 | |
Tandberg Video Communication Server | =x8.7.1 | |
Tandberg Video Communication Server | =x8.7.2 | |
Tandberg Video Communication Server | =x8.7.3 | |
Tandberg Video Communication Server | =x8.8 | |
Tandberg Video Communication Server | =x8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-6790 is classified as high due to its potential to cause a denial of service (DoS) condition.
To fix CVE-2017-6790, users should upgrade their Cisco TelePresence Video Communication Server to a patched version provided by Cisco.
CVE-2017-6790 affects Cisco TelePresence Video Communication Server versions x8.7, x8.7.1, x8.7.2, x8.7.3, x8.8, and x8.9.
Yes, CVE-2017-6790 can be exploited by an unauthenticated remote attacker.
CVE-2017-6790 is a denial of service (DoS) vulnerability related to excessive SIP traffic.