Cisco Security Advisory - Cisco TelePresence Collaboration Endpoint and RoomOS Software H.323 Denial of Service Vulnerability

Started by Netwörkheäd, April 25, 2022, 06:03:30 PM

Previous topic - Next topic

Netwörkheäd

Cisco TelePresence Collaboration Endpoint and RoomOS Software H.323 Denial of Service Vulnerability

<p>A vulnerability in the packet processing functionality of Cisco&nbsp;TelePresence Collaboration Endpoint (CE) Software and Cisco&nbsp;RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.</p>
<p>This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted H.323 traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to either reboot normally or reboot into maintenance mode, which could result in a DoS condition on the device.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ce-roomos-dos-c65x2Qf2</a></p>

     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2022-20783
Source: Cisco TelePresence Collaboration Endpoint and RoomOS Software H.323 Denial of Service Vulnerability
Let's not argue. Let's network!