Cisco Hosted Collaboration Mediation Excessive CPU Utilization Vulnerability

Cisco-SA-20130612-CVE-2013-3381 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the network stack of Cisco Hosted Collaboration Mediation could allow an unauthenticated, remote attacker to cause excessive CPU utilization on the affected system. The vulnerability is due to insufficient optimization of resources when the affected system is flooded with malformed UDP packets. An attacker could exploit this vulnerability by sending malformed UDP packets to UDP port 162 of the affected system. A successful exploit could allow the attacker to cause excessive CPU utilization on the affected system. CPU utilization returns to a normal state once the attack is terminated. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, the attacker may need access to a trusted, internal network to send malformed UDP packets to the targeted device. This access requirement decreases the likelihood of a successful exploit. Customers are advised to review the bug reports in the "Vendor Announcements" section for a current list of affected versions. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2013-3381
Cisco Bug IDsCSCug85756
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C

Products with public affected evidence