First published: Wed Oct 06 2021(Updated: )
It was previously published that a vulnerability in the memory management of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, local attacker to corrupt a shared memory segment, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient access controls to a shared memory resource. An attacker could exploit this vulnerability by corrupting a shared memory segment on an affected device. A successful exploit could allow the attacker to cause the device to reload. The device will recover from the corruption upon reboot. After additional investigation it was determined that this vulnerability is not exploitable in production software. Cisco has provided software updates for this issue. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tpce-rmos-mem-dos-rck56tT
Credit: by KY the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco On-Premises Software | =10<10.8.2>=Earlier than 9<=9<9.15.8 | 10.8.2 9.15.8 |
Cisco Cloud Managed Software | =Earlier than RoomOS August 2021<RoomOS August 2021 Drop | RoomOS August 2021 Drop |
Cisco Cloud Managed Software | =Earlier than RoomOS November 2021<RoomOS November 2021 Drop | RoomOS November 2021 Drop |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.