Описание
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.11, when handling DTLS-SRTP for media setup, FreeSWITCH is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. If an attacker manages to send a ClientHello DTLS message with an invalid CipherSuite (such as TLS_NULL_WITH_NULL_NULL) to the port on the FreeSWITCH server that is expecting packets from the caller, a DTLS error is generated. This results in the media session being torn down, which is followed by teardown at signaling (SIP) level too. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable FreeSWITCH servers for calls that rely on DTLS-SRTP. To address this vulnerability, upgrade FreeSWITCH to
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Patch
- ExploitVendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- Patch
- ExploitVendor Advisory
Уязвимые конфигурации
EPSS
7.5 High
CVSS3
5.9 Medium
CVSS3
Дефекты
Связанные уязвимости
FreeSWITCH is a Software Defined Telecom Stack enabling the digital tr ...
Уязвимость программно-определяемого телекоммуникационного стека FreeSWITCH, связанная с некорректной обработкой исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.5 High
CVSS3
5.9 Medium
CVSS3