Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2mfh-qqrx-9f28

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.

Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.

EPSS

Процентиль: 84%
0.02334
Низкий

Связанные уязвимости

nvd
около 19 лет назад

Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.

EPSS

Процентиль: 84%
0.02334
Низкий