Cisco Security Advisory 2024年07月05日
Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

思科多个统一通信产品的API端点存在漏洞,可能被远程攻击者利用导致高CPU利用率,影响管理界面访问和通话处理,思科已发布软件更新

🎯该漏洞存在于思科多个统一通信产品的API端点,未经授权的远程攻击者可借此使CPU利用率升高,进而对设备的网络管理界面访问及通话处理造成影响。此API在设备正常操作中不太可能被使用。

🚫漏洞原因是API认证不当及请求验证不完全。攻击者可通过向设备特定API发送特制HTTP请求来利用此漏洞,成功后会导致因高CPU利用率而产生的拒绝服务情况,对用户流量和管理访问产生负面影响。

🔧思科已发布软件更新来解决此漏洞,但目前没有其他解决此漏洞的方法。此安全公告可在指定链接查看。

A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device.

This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.   

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-apidos-PGsDcdNF


Security Impact Rating: High
CVE: CVE-2023-20259

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

思科 漏洞 高CPU利用率 软件更新
相关文章