First published: Wed Sep 25 2024(Updated: )
A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to a null pointer dereference
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-httpsrvr-dos-yOZThut is classified as high due to its potential to allow a denial of service condition.
To mitigate cisco-sa-httpsrvr-dos-yOZThut, it is recommended to upgrade to a fixed version of Cisco IOS XE Software as specified in the advisory.
The cisco-sa-httpsrvr-dos-yOZThut vulnerability is caused by a null pointer dereference within the HTTP Server feature when the Telephony Service is enabled.
Users of Cisco IOS XE Software with the Telephony Service feature enabled are affected by the cisco-sa-httpsrvr-dos-yOZThut vulnerability.
No, cisco-sa-httpsrvr-dos-yOZThut can be exploited by an unauthenticated, remote attacker.