Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-12654

Опубликовано: 25 сент. 2019
Источник: nvd
CVSS3: 8.6
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:ios_xe:15.6\(1\)s4.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*

EPSS

Процентиль: 78%
0.0116
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-476
CWE-476

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.

CVSS3: 8.6
fstec
больше 6 лет назад

Уязвимость реализации протокола SIP (Session Initiation Protocol) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 78%
0.0116
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-476
CWE-476