A vulnerability in the Session Initiation Protocol (SIP) protocol implementation of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of input SIP traffic. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected Cisco Unified Communications Manager. A successful exploit could allow the attacker to trigger a new registration process on all connected phones, temporarily disrupting service.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-cucm-dos | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-07-05 19:15
Updated : 2019-10-09 16:48
NVD link : CVE-2019-1887
Mitre link : CVE-2019-1887
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
cisco
- unified_communications_manager