ID

VAR-201706-0577


CVE

CVE-2017-6648


TITLE

Cisco TelePresence Codec and Collaboration Endpoint In software TelePresence Vulnerabilities that cause endpoints to reload unexpectedly

Trust: 0.8

sources: JVNDB: JVNDB-2017-004720

DESCRIPTION

A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002. Cisco TelePresence Endpoint is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)

Trust: 1.98

sources: NVD: CVE-2017-6648 // JVNDB: JVNDB-2017-004720 // BID: 98934 // VULHUB: VHN-114851

AFFECTED PRODUCTS

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.3.3

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.3.2

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.2.2

Trust: 1.6

vendor:ciscomodel:telepresence ce softwarescope:eqversion:8.2.2

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.3.3

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.1-cucm

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.2.1

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.7-cucm

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.1

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.2

Trust: 1.6

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.2.4

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.4

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.1.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.0.2

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.2.3

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.1.2

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.3

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.2.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.4

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.2.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.3.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.7

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.1.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.4-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.3

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.2_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.3.4

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.3.6

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.0-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.1.3

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.11

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.3.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.1.2

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.6-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:3.1.5

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.0_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.3

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.5

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.13

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.2-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.2.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.0.2-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.0-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.1_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:4.1.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:8.2.0

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.4

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:8.2.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.3-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.1.4

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.6

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.0.1-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.3.5

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.3.1

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:3.1_base

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:5.1.5-cucm

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.3.7

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:6.1.2

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.3.2

Trust: 1.0

vendor:ciscomodel:telepresence tc softwarescope:eqversion:7.3.0

Trust: 1.0

vendor:ciscomodel:telepresence ce softwarescope:ltversion:8.3.0

Trust: 0.8

vendor:ciscomodel:telepresence tc softwarescope:ltversion:7.3.8

Trust: 0.8

vendor:ciscomodel:telepresence integrator c seriesscope:eqversion:8.2

Trust: 0.3

vendor:ciscomodel:telepresence collaboration endpointscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:telepresence codecscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:telepresence integrator c seriesscope:neversion:8.3

Trust: 0.3

vendor:ciscomodel:telepresence integrator c seriesscope:neversion:7.3.8

Trust: 0.3

vendor:ciscomodel:telepresence collaboration endpointscope:neversion:8.3

Trust: 0.3

vendor:ciscomodel:telepresence codecscope:neversion:7.3.8

Trust: 0.3

sources: BID: 98934 // JVNDB: JVNDB-2017-004720 // CNNVD: CNNVD-201706-314 // NVD: CVE-2017-6648

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6648
value: HIGH

Trust: 1.0

NVD: CVE-2017-6648
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201706-314
value: HIGH

Trust: 0.6

VULHUB: VHN-114851
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6648
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114851
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6648
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114851 // JVNDB: JVNDB-2017-004720 // CNNVD: CNNVD-201706-314 // NVD: CVE-2017-6648

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: VULHUB: VHN-114851 // JVNDB: JVNDB-2017-004720 // NVD: CVE-2017-6648

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-314

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201706-314

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004720

PATCH

title:cisco-sa-20170607-teleurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-tele

Trust: 0.8

title:Cisco TelePresence Codec and Collaboration Endpoint Repair measures for software resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71227

Trust: 0.6

sources: JVNDB: JVNDB-2017-004720 // CNNVD: CNNVD-201706-314

EXTERNAL IDS

db:NVDid:CVE-2017-6648

Trust: 2.8

db:BIDid:98934

Trust: 2.0

db:SECTRACKid:1038624

Trust: 1.7

db:JVNDBid:JVNDB-2017-004720

Trust: 0.8

db:CNNVDid:CNNVD-201706-314

Trust: 0.7

db:VULHUBid:VHN-114851

Trust: 0.1

sources: VULHUB: VHN-114851 // BID: 98934 // JVNDB: JVNDB-2017-004720 // CNNVD: CNNVD-201706-314 // NVD: CVE-2017-6648

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170607-tele

Trust: 2.0

url:http://www.securityfocus.com/bid/98934

Trust: 1.7

url:http://www.securitytracker.com/id/1038624

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6648

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6648

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-114851 // BID: 98934 // JVNDB: JVNDB-2017-004720 // CNNVD: CNNVD-201706-314 // NVD: CVE-2017-6648

CREDITS

Knud Hojgaard

Trust: 0.3

sources: BID: 98934

SOURCES

db:VULHUBid:VHN-114851
db:BIDid:98934
db:JVNDBid:JVNDB-2017-004720
db:CNNVDid:CNNVD-201706-314
db:NVDid:CVE-2017-6648

LAST UPDATE DATE

2025-04-20T23:23:44.757000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114851date:2019-10-03T00:00:00
db:BIDid:98934date:2017-06-07T20:02:00
db:JVNDBid:JVNDB-2017-004720date:2017-07-05T00:00:00
db:CNNVDid:CNNVD-201706-314date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6648date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-114851date:2017-06-08T00:00:00
db:BIDid:98934date:2017-06-07T00:00:00
db:JVNDBid:JVNDB-2017-004720date:2017-07-05T00:00:00
db:CNNVDid:CNNVD-201706-314date:2017-06-08T00:00:00
db:NVDid:CVE-2017-6648date:2017-06-08T13:29:00.517