First published: Wed Sep 25 2019(Updated: )
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-sip-dos This advisory is part of the September 25, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190925-sip-dos is considered to be high due to its potential to cause denial of service.
To fix cisco-sa-20190925-sip-dos, you should upgrade to the latest software version provided by Cisco that addresses this vulnerability.
cisco-sa-20190925-sip-dos affects Cisco IOS and IOS XE software, which are used in various networking devices.
No, there are currently no workarounds available for the cisco-sa-20190925-sip-dos vulnerability.
The cisco-sa-20190925-sip-dos vulnerability was disclosed on September 25, 2019.