First published: Wed Aug 21 2024(Updated: )
A vulnerability in the SIP call processing function of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper parsing of SIP messages. An attacker could exploit this vulnerability by sending a crafted SIP message to an affected Cisco Unified CM or Cisco Unified CM SME device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition that interrupts the communications of reliant voice and video devices.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager Session Management Edition | ||
Cisco Unified Communications Manager Session Management Edition |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20375 has been assigned a high severity rating due to its potential to cause a denial of service condition.
To mitigate CVE-2024-20375, apply the latest security patch provided by Cisco for the affected software.
CVE-2024-20375 affects Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition.
Yes, CVE-2024-20375 allows unauthenticated remote attackers to exploit the vulnerability.
The impact of CVE-2024-20375 is a denial of service condition, disrupting normal operation of the affected systems.