A vulnerability in the Session Initiation Protocol (SIP) protocol implementation of Cisco Unified Communications Manager could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of input SIP traffic. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected Cisco Unified Communications Manager. A successful exploit could allow the malicious user to trigger a new registration process on all connected phones, temporarily disrupting service.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco unified communications manager 11.5(1.10000.6) |
||
cisco unified communications manager 10.5(2.10000.5) |
||
cisco unified communications manager 12.0(1.10000.10) |
||
cisco unified communications manager 12.5(1.10000.22) |