Condorlab

Cisco – Vulnerability in (SIP) on the Cisco TelePresence (VCS) allow DoS


Advisory IDRSN-SIP-1762

 

Vulnerability Information

 

A vulnerability in the Session Initiation Protocol (SIP) on the Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the targeted appliance. The vulnerability is due to excessive SIP traffic sent to the device. An attacker could exploit this vulnerability by transmitting large volumes of SIP traffic to the VCS. An exploit could allow the attacker to cause a complete DoS condition on the targeted system.


Release Date

2017-06-13 00:00:00

 

Technical Information

 

Bug in Cisco TelePresence Video Communication Server. A remote user can cause denial of service conditions on the target system. A remote user can send large amounts of Session Initiation Protocol (SIP) data to the target device to cause denial of service on the target system. For more information on the affected versions, CVE-2017-6790 was assigned for this bug.


Solutions

 

 

The UCTM solution from RedShift Networks provides the industry’s first complete security solution developed to secure VOIP networks, endpoints and applications. His research team Condor-Labs.com is constantly looking for new attack patterns, advanced penetration testing methods, vulnerability identification and deployment of new signatures for constantly subscribed clients. For more information visit www.redshiftnetworks.com


External Resources

 

 

Cisco Security Advisory

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-vcs

Common Vulnerabilities and Exposures (CVE)

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6790