Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Therefore, the file is allowed to consume the majority of available disk space on the appliance. The vulnerability occurs because a certain system log file does not have a maximum size restriction. Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2023
Categories |