First published: Thu Feb 22 2018(Updated: )
A vulnerability in the Interactive Voice Response (IVR) management connection interface for Cisco Unified Customer Voice Portal (CVP) could allow an unauthenticated, remote attacker to cause the IVR connection to disconnect, creating a system-wide denial of service (DoS) condition. The vulnerability is due to improper handling of a TCP connection request when the IVR connection is already established. An attacker could exploit this vulnerability by initiating a crafted connection to the IP address of the targeted CVP device. An exploit could allow the attacker to disconnect the IVR to CVP connection, creating a DoS condition that prevents the CVP from accepting new, incoming calls while the IVR automatically attempts to re-establish the connection to the CVP. This vulnerability affects Cisco Unified Customer Voice Portal (CVP) Software Release 11.5(1). Cisco Bug IDs: CSCve70560.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Customer Voice Portal | =11.5\(1\) | |
Cisco Unified Customer Voice Portal | =11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0139 is a vulnerability in the Interactive Voice Response (IVR) management connection interface for Cisco Unified Customer Voice Portal (CVP) that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
CVE-2018-0139 affects Cisco Unified Customer Voice Portal versions 11.5(1) and 11.6.
CVE-2018-0139 has a severity rating of 8.6 (High).
An unauthenticated, remote attacker can exploit CVE-2018-0139 to cause the IVR connection to disconnect, creating a system-wide denial of service (DoS) condition.
You can find more information about CVE-2018-0139 on the following websites: [SecurityFocus](http://www.securityfocus.com/bid/103124), [SecurityTracker](http://www.securitytracker.com/id/1040414), and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-cvp).