First published: Fri Feb 08 2019(Updated: )
A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server | >=2.3.0<2.3.9 | |
>=2.3.0<2.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1676 is a vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
CVE-2019-1676 affects Cisco Meeting Server by causing a denial of service (DoS) condition.
CVE-2019-1676 has a severity rating of high, with a CVSS score of 7.5.
The CVE-2019-1676 vulnerability can be exploited by an unauthenticated, remote attacker through the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software.
Yes, Cisco has released a security advisory with details on how to mitigate the CVE-2019-1676 vulnerability.