Vulnslist

find the latest Cisco vulnerabilities

Cisco TelePresence Multipoint Control Unit Remote Code Execution Vulnerability

cisco-sa-20170125-telepresence · Critical · Published · Updated

A vulnerability in a proprietary device driver in the kernel of Cisco TelePresence Multipoint Control Unit (MCU) Software could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. The vulnerability is due to improper size validation when reassembling fragmented IPv4 or IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv4 or IPv6 fragments to a port receiving content in Passthrough content mode. An exploit could allow the attacker to overflow a buffer. If successful, the attacker could execute arbitrary code or cause a DoS condition on the affected system. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-telepresence

Workarounds

There are no workarounds that address this vulnerability.

Mitigations

To prevent exploitation of this vulnerability, customers can configure TelePresence MCU Software to use Transcoded content mode instead of Passthrough content mode.

Note: In Transcoded content mode, video resolution might be lower than in Passthrough content mode.

CVEsCVE-2017-3792
Cisco Bug IDsCSCuu67675
CVSS ScoreBase 9.8
Base 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco TelePresence MCU Software

Related Products

Product CVE Evidence
Cisco TelePresence MCU Software CVE-2017-3792 Cisco OpenVuln
Cisco TelePresence CVE-2017-3792 Cisco OpenVuln