mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
175 lines
8.0 KiB
JSON
175 lines
8.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-20375",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in the SIP call processing function of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper parsing of SIP messages. An attacker could exploit this vulnerability by sending a crafted SIP message to an affected Cisco Unified CM or Cisco Unified CM SME device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition that interrupts the communications of reliant voice and video devices."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Out-of-bounds Write",
|
|
"cweId": "CWE-787"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco Unified Communications Manager",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.0(1)SU1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.0(1)SU2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.0(1)SU3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.0(1)SU4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.0(1)SU5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU5"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU7"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU7a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU8"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12.5(1)SU8a"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14SU1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14SU2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14SU3"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-kkHq43We",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-kkHq43We"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-cucm-dos-kkHq43We",
|
|
"discovery": "EXTERNAL",
|
|
"defects": [
|
|
"CSCwi68892"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"baseScore": 8.6,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
}
|
|
]
|
|
}
|
|
} |