#VU8897 Improper input validation in Cisco Expressway and Cisco TelePresence Video Communication Server - CVE-2017-12287


| Updated: 2018-05-23

Vulnerability identifier: #VU8897

Vulnerability risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-12287

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco Expressway
Server applications / Conferencing, Collaboration and VoIP solutions
Cisco TelePresence Video Communication Server
Server applications / Other server solutions

Vendor: Cisco Systems, Inc

Description
The vulnerability allows a remote authenticated attacker to cause DoS conditions.

The weakness exists in the cluster database (CDB) management component of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) Software due to incomplete input validation of URL requests by the REST API. A remote attacker can send a specially crafted URL to the REST API and cause the CDB process on an affected system to restart.

Successful exploitation of the vulnerability may result in denial of service.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability. The vendor has schedules fixes for 2018.

Vulnerable software versions

Cisco Expressway: X8.1 - X8.10.4

Cisco TelePresence Video Communication Server: All versions


External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-expressway-t...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability