First published: Wed Nov 01 2023(Updated: )
A vulnerability in an API of the Web Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause a partial availability condition, which could cause ongoing video calls to be dropped due to the invalid packets reaching the Web Bridge.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server | <3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20255 is a vulnerability in the Web Bridge feature of Cisco Meeting Server that allows an unauthenticated attacker to cause a DoS condition.
CVE-2023-20255 affects Cisco Meeting Server versions up to and excluding 3.6.1.
CVE-2023-20255 has a severity level of medium with a CVSS score of 5.3.
An attacker can exploit CVE-2023-20255 by sending crafted HTTP requests to the API of the Web Bridge feature.
Cisco has released a security advisory with mitigation details for CVE-2023-20255, which can be found at the following URL: [link](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-segfault-G6ES4Ve8)