First published: Wed Apr 20 2022(Updated: )
A vulnerability in the packet processing functionality of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted H.323 traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to either reboot normally or reboot into maintenance mode, which could result in a DoS condition on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2
Credit: the National Security Agency (NSA).
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | =10<10.11.2.2>=Earlier than 9<=9<9.15.10.8 | 10.11.2.2 9.15.10.8 |
Cisco RoomOS | =Earlier than RoomOS January 2022<RoomOS January 2022 | RoomOS January 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ce-roomos-dos-c65x2Qf2 is critical due to its potential to cause a denial of service on affected devices.
To fix cisco-sa-ce-roomos-dos-c65x2Qf2, upgrade Cisco TelePresence CE Software to version 10.11.2.2 or later, or Cisco RoomOS Software to January 2022 or later.
Cisco TelePresence CE Software versions before 10.11.2.2 and Cisco RoomOS Software versions before January 2022 are affected by cisco-sa-ce-roomos-dos-c65x2Qf2.
Yes, cisco-sa-ce-roomos-dos-c65x2Qf2 can be exploited by unauthenticated remote attackers.
cisco-sa-ce-roomos-dos-c65x2Qf2 allows for a denial of service (DoS) attack that can disable the affected device.