Remote denial of service in Cisco Expressway and TelePresence VCS



Published: 2017-01-25
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-3790
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco Expressway
Server applications / Conferencing, Collaboration and VoIP solutions

Cisco TelePresence Video Communication Server
Server applications / Other server solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Memory corruption

EUVDB-ID: #VU12994

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3790

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error when processing h323 calls. A remote unauthenticated attacker can initiate connection to the vulnerable service, send specially crafted h224 data in Real-Time Transport Protocol (RTP) packets, trigger memory corruption and h323 call parser and crash the service.

Successful exploitation of the vulnerability requires that the attacker can send network packets to h323 interface.

Mitigation

Update to version X8.8.2.

Vulnerable software versions

Cisco Expressway: X8.1 - X8.8.1

Cisco TelePresence Video Communication Server: All versions

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-expressway
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCus99263


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###