Improper input validation in Unified Communications Manager (CallManager) - CVE-2017-6791
Published: September 7, 2017
Vulnerability identifier: #VU8158
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6791
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Unified Communications Manager (CallManager)
Unified Communications Manager (CallManager)
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the Trust Verification Service (TVS) due to improper handling of Transport Layer Security (TLS) traffic. A remote attacker can generate incomplete traffic streams, deny access to the TVS and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists in the Trust Verification Service (TVS) due to improper handling of Transport Layer Security (TLS) traffic. A remote attacker can generate incomplete traffic streams, deny access to the TVS and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-6791
The vulnerability is addressed in the following versions: 11.5(1.10000.6), 11.5(0.98000.806), 11.5(0.98000.566), 11.5(0.98000.260), 11.5(0.98000.208), 11.0(1.23900.5), 11.0(1.22048.1), 10.5(2.14900.16), 10.5(2.14074.1), 9.1(2.16900.2), 9.1(2.16137.1).