First published: Wed Jul 03 2019(Updated: )
A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ip-phone-sip-dos
Credit: Thomas Sabono xen1thLabs
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SIP IP Phone Software | ||
Cisco IP Phone 7800 Series Firmware | ||
Cisco IP Phone 8800 Series Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190703-ip-phone-sip-dos is classified as high due to its potential impact on the availability of affected devices.
To fix cisco-sa-20190703-ip-phone-sip-dos, update the Cisco SIP IP Phone Software to the latest release as specified in the advisory.
The affected devices include Cisco SIP IP Phone Software, Cisco IP Phone 7800 Series, and Cisco IP Phone 8800 Series.
Yes, cisco-sa-20190703-ip-phone-sip-dos can be exploited remotely by an unauthenticated attacker.
The impact of cisco-sa-20190703-ip-phone-sip-dos is a denial of service (DoS) condition that can disrupt the functionality of the affected IP phones.