First published: Wed Feb 20 2019(Updated: )
A vulnerability in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation for the Cisco IP Phone 7800 and 8800 Series could allow an unauthenticated, adjacent attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Phone 7800 Series Firmware | ||
Cisco IP Phone 8800 Series Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190220-cdp-lldp-dos is classified as high due to its potential to cause denial of service.
To fix cisco-sa-20190220-cdp-lldp-dos, you need to update the firmware of affected Cisco IP Phone 7800 and 8800 Series to the latest version provided by Cisco.
The vulnerability cisco-sa-20190220-cdp-lldp-dos affects users of Cisco IP Phone 7800 and 8800 Series devices.
The potential impact of cisco-sa-20190220-cdp-lldp-dos includes unexpected reboots of the affected Cisco IP Phones, leading to temporary denial of service.
No, authentication is not required to exploit the vulnerability cisco-sa-20190220-cdp-lldp-dos, allowing unauthenticated adjacent attackers to cause issues.