A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.

Project Subscriptions

Vendors Products
Ip Conference Phone 7832 Subscribe
Ip Conference Phone 7832 Firmware Subscribe
Ip Conference Phone 8832 Subscribe
Ip Conference Phone 8832 Firmware Subscribe
Ip Phone 7811 Subscribe
Ip Phone 7811 Firmware Subscribe
Ip Phone 7821 Subscribe
Ip Phone 7821 Firmware Subscribe
Ip Phone 7841 Subscribe
Ip Phone 7841 Firmware Subscribe
Ip Phone 7861 Subscribe
Ip Phone 7861 Firmware Subscribe
Ip Phone 8811 Subscribe
Ip Phone 8811 Firmware Subscribe
Ip Phone 8841 Subscribe
Ip Phone 8841 Firmware Subscribe
Ip Phone 8845 Subscribe
Ip Phone 8845 Firmware Subscribe
Ip Phone 8851 Subscribe
Ip Phone 8851 Firmware Subscribe
Ip Phone 8861 Subscribe
Ip Phone 8861 Firmware Subscribe
Ip Phone 8865 Subscribe
Ip Phone 8865 Firmware Subscribe
Unified Ip 8831 Conference Phone1 Subscribe
Unified Ip 8831 Conference Phone1 Firmware Subscribe
Unified Ip 8831 Conference Phone For Third-party Call Control2 Subscribe
Unified Ip 8831 Conference Phone For Third-party Call Control2 Firmware Subscribe
Wireless Ip Phone 8821 Subscribe
Wireless Ip Phone 8821-ex Subscribe
Wireless Ip Phone 8821-ex Firmware Subscribe
Wireless Ip Phone 8821 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10192 A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T19:09:54.267Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1635

cve-icon Vulnrichment

Updated: 2024-08-04T18:20:28.359Z

cve-icon NVD

Status : Modified

Published: 2019-05-03T15:29:00.713

Modified: 2024-11-21T04:36:58.740

Link: CVE-2019-1635

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses