Vulnerability Details : CVE-2018-0332
A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945.
Vulnerability category: Denial of service
Products affected by CVE-2018-0332
- cpe:2.3:o:cisco:unified_ip_phone_firmware:9.9\(9.99002.1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_firmware:9.4\(2\)sr3.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_firmware:9.4\(2\)sr4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-0332
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0332
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-0332
-
Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2018-0332
-
http://www.securityfocus.com/bid/104445
Cisco Unified IP Phone Software CVE-2018-0332 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1041074
Cisco Unified IP Phone SIP Packet Processing Flaw Lets Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ip-phone-dos
Cisco Unified IP Phone Software Denial of Service VulnerabilityVendor Advisory
Jump to