First published: Wed May 16 2018(Updated: )
A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 7800 Series, IP Phone 8800 Series, and Wireless IP Phone 8821 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to incomplete input validation of SIP Session Description Protocol (SDP) parameters by the SDP parser of an affected phone. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected phone. A successful exploit could allow the attacker to cause all active phone calls on the affected phone to be dropped while the SIP process on the phone unexpectedly restarts, resulting in a DoS condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-ip-phone-dos
Credit: Mozilla.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Phone 7800 Series Firmware | ||
Cisco IP Phone 8800 Series Software | ||
Cisco Wireless IP Phone 8821-EX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180516-ip-phone-dos is classified as a denial of service vulnerability.
To fix cisco-sa-20180516-ip-phone-dos, update your Cisco IP Phone 7800 Series, 8800 Series, or Wireless IP Phone 8821 to the latest software version provided by Cisco.
The devices affected by cisco-sa-20180516-ip-phone-dos include Cisco IP Phone 7800 Series, IP Phone 8800 Series, and Wireless IP Phone 8821.
Symptoms of a denial of service due to cisco-sa-20180516-ip-phone-dos include unresponsive IP phones and inability to initiate calls.
An unauthenticated, remote attacker can exploit the cisco-sa-20180516-ip-phone-dos vulnerability.