Lucene search

K
ciscoCiscoCISCO-SA-CMS-SEGFAULT-G6ES4VE8
HistoryNov 01, 2023 - 4:00 p.m.

Cisco Meeting Server Web Bridge Denial of Service Vulnerability

2023-11-0116:00:00
tools.cisco.com
12
cisco
meeting server
web bridge
denial of service
vulnerability
api
remote attacker
dos condition
http requests
crafted packets
software updates

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

22.8%

A vulnerability in an API of the Web Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

This vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause a partial availability condition, which could cause ongoing video calls to be dropped due to the invalid packets reaching the Web Bridge.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-segfault-G6ES4Ve8 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-segfault-G6ES4Ve8”]

Affected configurations

Vulners
Node
ciscomeeting_serverMatchany
OR
ciscomeeting_serverMatchany
VendorProductVersionCPE
ciscomeeting_serveranycpe:2.3:a:cisco:meeting_server:any:*:*:*:*:*:*:*

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

22.8%

Related for CISCO-SA-CMS-SEGFAULT-G6ES4VE8