Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-1684 |
CWE-ID | CWE-20 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco 8800 Series IP Phones Hardware solutions / Office equipment, IP-phones, print servers Cisco 7800 Series IP Phones Hardware solutions / Office equipment, IP-phones, print servers |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU17842
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-1684
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the Cisco Discovery Protocol or Link Layer Discovery Protocol (LLDP) implementation due to missing length validation of certain Cisco Discovery Protocol or LLDP packet header fields. An adjacent attacker can send a malicious Cisco Discovery Protocol or LLDP packet and cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
MitigationThe vulnerability has been addressed in the versions 12.6(1)MN80, 12.5(1)SR2, 12.5(1)ES1, 12.1(1)SR2.1.
Vulnerable software versionsCisco 8800 Series IP Phones: 12.1.1
Cisco 7800 Series IP Phones: 12.1.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.