![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.811084 |
Categoría: | CISCO |
Título: | Cisco TelePresence CE and TC Software 'SIP' DoS Vulnerability (cisco-sa-20170607-tele) |
Resumen: | Cisco TelePresence Endpoint is prone to a denial of service (DoS) vulnerability. |
Descripción: | Summary: Cisco TelePresence Endpoint is prone to a denial of service (DoS) vulnerability. Vulnerability Insight: The flaw is due to a lack of flow-control mechanisms within the software. Vulnerability Impact: Successful exploitation will allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. Affected Software/OS: Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. This vulnerability affects the following Cisco TelePresence products, TelePresence MX Series, TelePresence SX Series, TelePresence Integrator C Series, TelePresence System EX Series, TelePresence DX Series, TelePresence System Profile MXP Series, TelePresence Profile Series. Solution: Upgrade to Cisco TelePresence TC 7.3.8 or Cisco TelePresence CE 8.3.0 or later. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-6648 BugTraq ID: 98934 http://www.securityfocus.com/bid/98934 http://www.securitytracker.com/id/1038624 |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |