First published: Wed Apr 17 2019(Updated: )
A vulnerability in the phone book feature of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to cause the CPU to increase to 100% utilization, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to improper handling of the XML input. An attacker could exploit this vulnerability by sending a Session Initiation Protocol (SIP) message with a crafted XML payload to an affected device. A successful exploit could allow the attacker to exhaust CPU resources, resulting in a DoS condition. Manual intervention may be required to recover the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Mitigation options that address this vulnerability are available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway | ||
Cisco TelePresence Video Communication Server Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-20190417-es-tvcs-dos vulnerability is rated as high due to its potential to cause a denial of service condition.
To fix the cisco-sa-20190417-es-tvcs-dos vulnerability, apply the latest patches and updates provided by Cisco for the affected versions.
The cisco-sa-20190417-es-tvcs-dos vulnerability affects Cisco Expressway Series and Cisco TelePresence Video Communication Server.
Yes, the cisco-sa-20190417-es-tvcs-dos vulnerability can be exploited by an authenticated remote attacker.
The impact of the cisco-sa-20190417-es-tvcs-dos vulnerability is that it can cause 100% CPU utilization, leading to a denial of service on the affected system.