Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-12287 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Cisco Expressway Server applications / Conferencing, Collaboration and VoIP solutions Cisco TelePresence Video Communication Server Server applications / Other server solutions |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU8897
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-12287
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to cause DoS conditions.
The weakness exists in the cluster database (CDB) management component of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) Software due to incomplete input validation of URL requests by the REST API. A remote attacker can send a specially crafted URL to the REST API and cause the CDB process on an affected system to restart.
Successful exploitation of the vulnerability may result in denial of service.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability. The vendor has schedules fixes for 2018.
Cisco Expressway: X8.1 - X8.10.4
Cisco TelePresence Video Communication Server: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.