A vulnerability in the Session Initiation Protocol (SIP) protocol implementation of Cisco Unified Communications Manager could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of input SIP traffic. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected Cisco Unified Communications Manager. A successful exploit could allow the malicious user to trigger a new registration process on all connected phones, temporarily disrupting service.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco unified communications manager 10.5\\(2.10000.5\\) |
||
cisco unified communications manager 11.5\\(1.10000.6\\) |
||
cisco unified communications manager 12.0\\(1.10000.10\\) |
||
cisco unified communications manager 12.5\\(1.10000.22\\) |