Vulnerability identifier: #VU8897
Vulnerability risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-12287
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Expressway
Server applications /
Conferencing, Collaboration and VoIP solutions
Cisco TelePresence Video Communication Server
Server applications /
Other server solutions
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The weakness exists in the cluster database (CDB) management component of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) Software due to incomplete input validation of URL requests by the REST API. A remote attacker can send a specially crafted URL to the REST API and cause the CDB process on an affected system to restart.
Successful exploitation of the vulnerability may result in denial of service.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability. The vendor has schedules fixes for 2018.
Vulnerable software versions
Cisco Expressway: X8.1 - X8.10.4
Cisco TelePresence Video Communication Server: All versions
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-expressway-t...
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.