A vulnerability in the Session Initiation Protocol (SIP) protocol implementation of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of input SIP traffic. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected Cisco Unified Communications Manager. A successful exploit could allow the attacker to trigger a new registration process on all connected phones, temporarily disrupting service.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-19T19:03:11.614Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1887

Updated: 2024-08-04T18:35:51.907Z

Status : Modified
Published: 2019-07-06T02:15:11.090
Modified: 2024-11-21T04:37:37.050
Link: CVE-2019-1887

No data.