![]() This advisory is available at the following link: There are no workarounds that address this vulnerability. ![]() A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service condition.Ĭisco has released software updates that address this vulnerability. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. ![]() The vulnerability is due to insufficient sanity checks on received SIP messages. A vulnerability in the Session Initiation Protocol (SIP) library of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |