Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

DoS Vulnerabilities Patched in Cisco Unity Connection

Cisco has addressed several denial-of-service (DoS) vulnerabilities in Cisco Unity Connection, the company’s unified messaging platform.

The security holes affect Cisco Unity Connection version 10.0 and prior, but only if the product is configured with Session Initiation Protocol (SIP) trunk integration. Skinny Call Control Protocol (SCCP) integrations are not impacted.

Cisco has addressed several denial-of-service (DoS) vulnerabilities in Cisco Unity Connection, the company’s unified messaging platform.

The security holes affect Cisco Unity Connection version 10.0 and prior, but only if the product is configured with Session Initiation Protocol (SIP) trunk integration. Skinny Call Control Protocol (SCCP) integrations are not impacted.

One of the flaws patched by Cisco exists in the Connection Conversation Manager (CuCsMgr) process due to the incorrect processing of certain UDP packets (CVE-2015-0612). A remote attacker can exploit the bug to cause the SIP network port UDP 5060 to close by sending a specially crafted UDP packet to the targeted device. Once the port is closed, Unity Connection can no longer process any calls, Cisco said in its advisory.

Two other CuCsMgr vulnerabilities can be leveraged to trigger a core dump of the process and cause a DoS condition by sending a specially crafted SIP INVITE messages to the Cisco Unity Connection server (CVE-2015-0613, CVE-2015-0614). The flaws are caused by the incorrect processing of crafted SIP INVITE messages and they can be exploited with UDP, TCP, or TLS connections. These security holes are similar, but they are not the same because a different part of the SIP INVITE message is processed incorrectly, Cisco noted.

A similar vulnerability (CVE-2015-0616) is caused by the incorrect handling of abnormally terminated SIP conversations. An attacker can cause a core dump and a DoS condition by causing the incorrect termination of TCP SIP conversations.

Finally, Cisco has resolved a flaw that can be exploited by a remote attacker to cause all SIP ports to become busy (CVE-2015-0615). All SIP connection lines can be blocked because in some scenarios allocated resources are not released properly. Once a DoS condition is triggered, the only way to restore service is by restarting the conversation manager.

All of these vulnerabilities can be exploited both over IPv4 or IPv6 communications.

Cisco has released updates for each of the affected versions of the software. Cisco Unity Connection 10.5 and certain 10.0 releases are not affected.

Advertisement. Scroll to continue reading.

The company says it’s not aware of instances where these vulnerabilities have been used for malicious purposes, but some network scanners are known to exploit CVE-2015-0612.

In addition to the vulnerabilities affecting Cisco Unity Connection, the company patched a security bug in Cisco Prime Data Center Network Manager (DCNM). The product is plagued by a file information disclosure vulnerability that can be exploited by a remote, unauthenticated attacker to retrieve arbitrary files from the underlying operating system.

Related: Cisco Fixes DoS Vulnerabilities in IOS Software

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.