First published: Wed Feb 19 2020(Updated: )
A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) feature of Cisco Meeting Server software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition for users of XMPP conferencing applications. Other applications and processes are unaffected. The vulnerability is due to improper input validation of XMPP packets. An attacker could exploit this vulnerability by sending crafted XMPP packets to an affected device. An exploit could allow the attacker to cause process crashes and a DoS condition for XMPP conferencing applications. Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-xmpp-dos-ptfGUsBx
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-cms-xmpp-dos-ptfGUsBx is rated as high due to the potential for an unauthenticated remote attacker to cause a denial of service.
To fix cisco-sa-cms-xmpp-dos-ptfGUsBx, ensure that you apply the latest security updates provided by Cisco for the Meeting Server software.
Organizations using Cisco Meeting Server software that utilizes the XMPP feature are affected by cisco-sa-cms-xmpp-dos-ptfGUsBx.
The risks of cisco-sa-cms-xmpp-dos-ptfGUsBx include interruption of XMPP conferencing services and possible impacts on user productivity.
Currently, the recommended course of action for cisco-sa-cms-xmpp-dos-ptfGUsBx is to apply the security patch released by Cisco, as no specific workarounds are advised.