Buffer Overflow Vulnerability in Cisco TelePresence MCU Software
CVE-2017-3792

9.8CRITICAL

Summary

A vulnerability in a proprietary device driver within the kernel of Cisco TelePresence Multipoint Control Unit (MCU) Software allows unauthenticated remote attackers to execute arbitrary code or trigger a denial of service (DoS). This issue arises from improper size validation during the reassembly of fragmented IPv4 or IPv6 packets. By sending specially crafted packet fragments to a specific port in Passthrough content mode, an attacker could exploit this vulnerability to overflow a buffer, potentially leading to unauthorized actions on the affected systems. Cisco has released patches to mitigate this issue, and while no workarounds exist, certain mitigations may reduce risk exposure.

Affected Version(s)

Cisco TelePresence Multipoint Control Unit (MCU) software version 4.3(1.68) or later configured for Passthrough content mode Cisco TelePresence Multipoint Control Unit (MCU) software version 4.3(1.68) or later configured for Passthrough content mode

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.