Improper input validation in Cisco Expressway and Cisco TelePresence Video Communication Server - CVE-2017-12287

 

Improper input validation in Cisco Expressway and Cisco TelePresence Video Communication Server - CVE-2017-12287

Published: October 19, 2017 / Updated: May 23, 2018


Vulnerability identifier: #VU8897
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12287
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Expressway
Cisco TelePresence Video Communication Server

Detailed vulnerability description

The vulnerability allows a remote authenticated attacker to cause DoS conditions.

The weakness exists in the cluster database (CDB) management component of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) Software due to incomplete input validation of URL requests by the REST API. A remote attacker can send a specially crafted URL to the REST API and cause the CDB process on an affected system to restart.

Successful exploitation of the vulnerability may result in denial of service.

How to mitigate CVE-2017-12287

Cybersecurity Help is currently unaware of any official solution to address this vulnerability. The vendor has schedules fixes for 2018.

Sources