First published: Wed Feb 06 2019(Updated: )
A vulnerability in Cisco Meeting Server could allow an authenticated, remote attacker to cause a partial denial of service (DoS) to Cisco Meetings application users who are paired with a Session Initiation Protocol (SIP) endpoint. The vulnerability is due to improper validation of coSpaces configuration parameters. An attacker could exploit this vulnerability by inserting crafted strings in specific coSpace parameters. An exploit could allow the attacker to prevent clients from joining a conference call in the affected coSpace. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cms-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190206-cms-dos is classified as high due to its potential to cause a partial denial of service.
To fix cisco-sa-20190206-cms-dos, it is recommended to upgrade to the latest version of Cisco Meeting Server that addresses this vulnerability.
Cisco Meeting Server users who are authenticated and using a Session Initiation Protocol (SIP) endpoint are affected by cisco-sa-20190206-cms-dos.
cisco-sa-20190206-cms-dos is caused by improper validation of certain requests made to the Cisco Meeting Server.
Currently, there are no documented workarounds for cisco-sa-20190206-cms-dos, so applying the recommended software updates is essential.