Lucene search

K
ciscoCiscoCISCO-SA-CE-ROOMOS-DOS-C65X2QF2
HistoryApr 20, 2022 - 4:00 p.m.

Cisco TelePresence Collaboration Endpoint and RoomOS Software H.323 Denial of Service Vulnerability

2022-04-2016:00:00
tools.cisco.com
31
cisco
telepresence
roomos
h.323
denial of service
vulnerability
software
packet processing
remote attacker
input validation
maintenance mode
reboot

EPSS

0.001

Percentile

49.5%

A vulnerability in the packet processing functionality of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted H.323 traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to either reboot normally or reboot into maintenance mode, which could result in a DoS condition on the device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2”]

Affected configurations

Vulners
Node
ciscoroomosMatchany
OR
ciscotelepresence_ce_softwareMatchany
OR
ciscoroomosMatchany
OR
ciscotelepresence_ce_softwareMatchany
VendorProductVersionCPE
ciscoroomosanycpe:2.3:o:cisco:roomos:any:*:*:*:*:*:*:*
ciscotelepresence_ce_softwareanycpe:2.3:a:cisco:telepresence_ce_software:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

49.5%

Related for CISCO-SA-CE-ROOMOS-DOS-C65X2QF2