Vulnslist

find the latest Cisco vulnerabilities

Cisco TelePresence VCS and Expressway High CPU Utilization Vulnerability

Cisco-SA-20150115-CVE-2015-0579 · Medium · Published · Updated

A vulnerability in the SIP code of Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway could allow an unauthenticated, remote attacker to cause high memory consumption and CPU utilization, which could cause some services to become unavailable and degrade performance. The vulnerability is due to insufficient validation of crafted SIP packets. An attacker could exploit this vulnerability by sending crafted SIP packets to the affected system. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker may need access to trusted, internal networks behind a firewall to send crafted packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0579
Cisco Bug IDsCSCur12473
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
Product Names From Source
Cisco TelePresence Video Communication Server (VCS)

Related Products

Product CVE Evidence
Cisco TelePresence Video Communication Server (VCS) CVE-2015-0579 Cisco OpenVuln
Cisco TelePresence CVE-2015-0579 Cisco OpenVuln
Cisco Expressway CVE-2015-0579 Cisco OpenVuln