Cisco updated its Unified Communications Manager (UCM) product, fixing several vulnerabilities that if left unpatched could lead to a denial of service (DoS) attack, allow attackers to modify data or execute arbitrary commands.
The problems exist in versions 7.1, 8.5, 8.6, 9.0 and 9.1 of the company’s VoIP processing system and there are no workarounds, according to an advisory from Cisco.
The company’s Product Security Incident Response Team (PSIRT) said it is not aware that any of the vulnerabilities are suffering from exploits.
The DoS vulnerability is present on all of the versions listed. On 7.1 all an attacker would have to do is send a malformed registration message to the device to trigger the vulnerability. On the other versions an attacker could rapidly send UDP packets to ports on the device and trigger the vulnerability due to an insufficient rate limiting of traffic on the device’s Session Initiation Protocol (SIP) port.
All of the versions also feature a buffer overflow vulnerability stemming from insufficient bounds checking. An authenticated, remote attacker could exploit that vulnerability by overwriting a memory buffer on a device and let them corrupt data, disrupt services and run arbitrary commands.
Patches are available on for all three versions (7, 8 and 9) of the software although 8.5 users should upgrade to 8.6 to ensure they fix all the issues.