First published: Wed Apr 17 2019(Updated: )
A vulnerability in the XML API of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to cause the CPU to increase to 100% utilization, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to improper handling of the XML input. An attacker could exploit this vulnerability by sending a specifically crafted XML payload. A successful exploit could allow the attacker to exhaust CPU resources, resulting in a DoS condition until the system is manually rebooted. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ces-tvcs-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | ||
Cisco TelePresence Video Communication Server Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190417-ces-tvcs-dos is high due to its potential to cause a denial of service condition.
To fix cisco-sa-20190417-ces-tvcs-dos, update your Cisco Expressway Series and TelePresence Video Communication Server to the latest firmware version released by Cisco.
cisco-sa-20190417-ces-tvcs-dos enables authenticated remote attackers to overload the CPU, leading to a denial of service.
The affected Cisco products include the Cisco Expressway Series and the Cisco TelePresence Video Communication Server.
The impact of cisco-sa-20190417-ces-tvcs-dos can cause the affected systems' CPU utilization to spike to 100%, resulting in service disruption.