First published: Wed Feb 19 2020(Updated: )
A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) feature of Cisco Meeting Server software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition for users of XMPP conferencing applications. Other applications and processes are unaffected. The vulnerability is due to improper input validation of XMPP packets. An attacker could exploit this vulnerability by sending crafted XMPP packets to an affected device. An exploit could allow the attacker to cause process crashes and a DoS condition for XMPP conferencing applications.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server | <2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3160 is a vulnerability in the Extensible Messaging and Presence Protocol (XMPP) feature of Cisco Meeting Server software.
The severity of CVE-2020-3160 is medium, with a severity value of 5.3.
CVE-2020-3160 can cause a denial of service (DoS) condition for users of XMPP conferencing applications.
Cisco Meeting Server software up to version 2.8.0 is affected by CVE-2020-3160.
Yes, Cisco has released a patch to address the vulnerability. Please refer to the Cisco Security Advisory for more information.