← Back to CVEs
CVE-2018-0332
N/ADescription
A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945.
CVE Details
CVSS v3.1 ScoreN/A
Published6/7/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
cisco:ip_phone_7811cisco:ip_phone_7821cisco:ip_phone_7841cisco:ip_phone_7861cisco:ip_phone_8811cisco:ip_phone_8841cisco:ip_phone_8845cisco:ip_phone_8851cisco:ip_phone_8861cisco:ip_phone_8865cisco:ip_phone_firmwarecisco:unified_ip_phone_7906gcisco:unified_ip_phone_7911gcisco:unified_ip_phone_7912gcisco:unified_ip_phone_7931gcisco:unified_ip_phone_7940gcisco:unified_ip_phone_7941gcisco:unified_ip_phone_7942gcisco:unified_ip_phone_7945gcisco:unified_ip_phone_7960gcisco:unified_ip_phone_7961gcisco:unified_ip_phone_7962gcisco:unified_ip_phone_7965gcisco:unified_ip_phone_7975gcisco:unified_ip_phone_9951cisco:unified_ip_phone_9971cisco:unified_ip_phone_firmware
Weaknesses (CWE)
CWE-399
References
http://www.securityfocus.com/bid/104445(psirt@cisco.com)
http://www.securitytracker.com/id/1041074(psirt@cisco.com)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos(psirt@cisco.com)
http://www.securityfocus.com/bid/104445(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041074(af854a3a-2127-422b-91ae-364da2661108)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.