ID

VAR-201808-0310


CVE

CVE-2018-0409


TITLE

Cisco Unified Communications Manager IM & Presence Service and Cisco TelePresence Video Communication Server and Expressway Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-009615

DESCRIPTION

A vulnerability in the XCP Router service of the Cisco Unified Communications Manager IM & Presence Service (CUCM IM&P) and the Cisco TelePresence Video Communication Server (VCS) and Expressway could allow an unauthenticated, remote attacker to cause a temporary service outage for all IM&P users, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious IPv4 or IPv6 packet to an affected device on TCP port 7400. An exploit could allow the attacker to overread a buffer, resulting in a crash and restart of the XCP Router service. Cisco Bug IDs: CSCvg97663, CSCvi55947. Vendors have confirmed this vulnerability Bug ID CSCvg97663 and CSCvi55947 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Cisco Products are prone to a denial-of-service vulnerability. TelePresence Video Communication Server (VCS) and Expressway is a telepresence video communication server

Trust: 2.25

sources: NVD: CVE-2018-0409 // JVNDB: JVNDB-2018-009615 // BID: 105104 // BID: 105102 // VULHUB: VHN-118611

AFFECTED PRODUCTS

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.7

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.8

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.9

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.1

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.5

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x7.0.1

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.6

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.2.2

Trust: 1.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x7.2.4

Trust: 1.6

vendor:ciscomodel:unified communications manager im and presence servicescope:eqversion:11.5

Trust: 1.0

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.10.4

Trust: 1.0

vendor:ciscomodel:unified communications manager im and presence servicescope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:telepresence video communication server softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:unified communications manager im and presence servicescope: - version: -

Trust: 0.8

vendor:ciscomodel:web security appliance 11.5.0-fcs-000scope: - version: -

Trust: 0.3

vendor:ciscomodel:web security appliance 11.0.0-fcs-250scope: - version: -

Trust: 0.3

vendor:ciscomodel:web security appliance 10.5.0-fcs-000scope: - version: -

Trust: 0.3

vendor:ciscomodel:web security appliancescope:eqversion:10.0.0-959

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence servicescope:eqversion:12.0(1)

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence servicescope:eqversion:11.5(1)

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence servicescope:eqversion:11.0(1)

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence servicescope:eqversion:10.5(2)

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence servicescope:eqversion:10.5(1)

Trust: 0.3

vendor:ciscomodel:telepresence video communication server expresswayscope:eqversion:x8

Trust: 0.3

vendor:ciscomodel:telepresence video communication server expresswayscope:eqversion:x7.0.0

Trust: 0.3

vendor:ciscomodel:telepresence video communication server expresswayscope:eqversion:x6.1

Trust: 0.3

vendor:ciscomodel:telepresence video communication server expresswayscope:eqversion:x6.0

Trust: 0.3

vendor:ciscomodel:telepresence video communication server expresswayscope:eqversion:x5.2

Trust: 0.3

vendor:ciscomodel:unified communications manager im & presence service 11.5 su4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:telepresence video communication server expresswayscope:neversion:x8.11

Trust: 0.3

sources: BID: 105104 // BID: 105102 // JVNDB: JVNDB-2018-009615 // CNNVD: CNNVD-201808-462 // NVD: CVE-2018-0409

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0409
value: HIGH

Trust: 1.0

NVD: CVE-2018-0409
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201808-462
value: HIGH

Trust: 0.6

VULHUB: VHN-118611
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0409
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118611
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0409
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-0409
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-118611 // JVNDB: JVNDB-2018-009615 // CNNVD: CNNVD-201808-462 // NVD: CVE-2018-0409

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-125

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-118611 // JVNDB: JVNDB-2018-009615 // NVD: CVE-2018-0409

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201808-462

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201808-462

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-009615

PATCH

title:cisco-sa-20180815-ucmimps-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-ucmimps-dos

Trust: 0.8

title:Cisco Unified Communications Manager IM & Presence Service and TelePresence Video Communication Server and Expressway Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83762

Trust: 0.6

sources: JVNDB: JVNDB-2018-009615 // CNNVD: CNNVD-201808-462

EXTERNAL IDS

db:NVDid:CVE-2018-0409

Trust: 3.1

db:BIDid:105104

Trust: 2.0

db:BIDid:105102

Trust: 2.0

db:SECTRACKid:1041534

Trust: 1.7

db:SECTRACKid:1041533

Trust: 1.7

db:JVNDBid:JVNDB-2018-009615

Trust: 0.8

db:CNNVDid:CNNVD-201808-462

Trust: 0.7

db:VULHUBid:VHN-118611

Trust: 0.1

sources: VULHUB: VHN-118611 // BID: 105104 // BID: 105102 // JVNDB: JVNDB-2018-009615 // CNNVD: CNNVD-201808-462 // NVD: CVE-2018-0409

REFERENCES

url:http://www.securityfocus.com/bid/105102

Trust: 1.7

url:http://www.securityfocus.com/bid/105104

Trust: 1.7

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180815-ucmimps-dos

Trust: 1.7

url:http://www.securitytracker.com/id/1041533

Trust: 1.7

url:http://www.securitytracker.com/id/1041534

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0409

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0409

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180815-wsa-escalation#vp

Trust: 0.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180815-ucmimps-dos#vp

Trust: 0.3

sources: VULHUB: VHN-118611 // BID: 105104 // BID: 105102 // JVNDB: JVNDB-2018-009615 // CNNVD: CNNVD-201808-462 // NVD: CVE-2018-0409

CREDITS

The vendor reported this issue.

Trust: 0.6

sources: BID: 105104 // BID: 105102

SOURCES

db:VULHUBid:VHN-118611
db:BIDid:105104
db:BIDid:105102
db:JVNDBid:JVNDB-2018-009615
db:CNNVDid:CNNVD-201808-462
db:NVDid:CVE-2018-0409

LAST UPDATE DATE

2024-11-23T21:38:26.779000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118611date:2020-08-31T00:00:00
db:BIDid:105104date:2018-08-15T00:00:00
db:BIDid:105102date:2018-08-15T00:00:00
db:JVNDBid:JVNDB-2018-009615date:2018-11-22T00:00:00
db:CNNVDid:CNNVD-201808-462date:2020-09-02T00:00:00
db:NVDid:CVE-2018-0409date:2024-11-21T03:38:10.117

SOURCES RELEASE DATE

db:VULHUBid:VHN-118611date:2018-08-15T00:00:00
db:BIDid:105104date:2018-08-15T00:00:00
db:BIDid:105102date:2018-08-15T00:00:00
db:JVNDBid:JVNDB-2018-009615date:2018-11-22T00:00:00
db:CNNVDid:CNNVD-201808-462date:2018-08-16T00:00:00
db:NVDid:CVE-2018-0409date:2018-08-15T20:29:00.533