First published: Wed Jan 22 2025(Updated: )
A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.For more information about this vulnerability, see the Details section of this advisory.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco BroadWorks Xtended Services Platform Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-bw-sip-dos-mSySbrmt is categorized as high, due to its potential to cause a denial of service condition.
To fix cisco-sa-bw-sip-dos-mSySbrmt, you should apply the latest security patches and updates provided by Cisco for BroadWorks.
The cisco-sa-bw-sip-dos-mSySbrmt vulnerability is caused by improper memory handling in the SIP processing subsystem.
Cisco BroadWorks users are affected by the cisco-sa-bw-sip-dos-mSySbrmt vulnerability.
Yes, cisco-sa-bw-sip-dos-mSySbrmt can be exploited remotely by an unauthenticated attacker.