First published: Wed Apr 20 2022(Updated: )
A vulnerability in the packet processing functionality of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted H.323 traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to either reboot normally or reboot into maintenance mode, which could result in a DoS condition on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2
Credit: the National Security Agency (NSA).
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Telepresence CE Software | =10<10.11.2.2>=Earlier than 9<=9<9.15.10.8 | 10.11.2.2 9.15.10.8 |
Cisco RoomOS Software | =Earlier than RoomOS January 2022<RoomOS January 2022 | RoomOS January 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.