{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T09:45:16.722","vulnerabilities":[{"cve":{"id":"CVE-2024-20375","sourceIdentifier":"psirt@cisco.com","published":"2024-08-21T17:15:07.303","lastModified":"2025-08-01T20:37:23.273","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the SIP call processing function of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper parsing of SIP messages. An attacker could exploit this vulnerability by sending a crafted SIP message to an affected Cisco Unified CM or Cisco Unified CM SME device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition that interrupts the communications of reliant voice and video devices."},{"lang":"es","value":"Una vulnerabilidad en la función de procesamiento de llamadas SIP de Cisco Unified Communications Manager (Unified CM) y Cisco Unified Communications Manager Session Management Edition (Unified CM SME) podría permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un análisis inadecuado de los mensajes SIP. Un atacante podría aprovechar esta vulnerabilidad enviando un mensaje SIP manipulado a un dispositivo Cisco Unified CM o Cisco Unified CM SME afectado. Un exploit exitoso podría permitir al atacante hacer que el dispositivo se recargue, lo que resultaría en una condición DoS que interrumpa las comunicaciones de los dispositivos de voz y video dependientes."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1\\)su1:*:*:*:*:*:*:*","matchCriteriaId":"44F6D6CC-19C5-4BFF-BABC-84E4A06A2BFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1\\)su2:*:*:*:*:*:*:*","matchCriteriaId":"E1215A7B-3A27-4A05-99F4-CB1B0D270C72"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1\\)su3:*:*:*:*:*:*:*","matchCriteriaId":"B0715148-5B7E-48C6-A51C-76D74E4AAB50"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1\\)su4:*:*:*:*:*:*:*","matchCriteriaId":"B39D687F-A996-4F30-9D3C-838CDE8B2349"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1\\)su5:*:*:*:*:*:*:*","matchCriteriaId":"D61F0795-B5F2-4DFC-A1DD-1175AAF2ED0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"3EB73BD4-9ECC-458E-925D-FECE9A49BD48"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su1:*:*:*:*:*:*:*","matchCriteriaId":"1C9751FC-5C3C-4D7B-B368-39FF096C1581"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su2:*:*:*:*:*:*:*","matchCriteriaId":"E411B60D-4EFA-4A8C-A9A0-74B7524B2B72"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su3:*:*:*:*:*:*:*","matchCriteriaId":"EC7EAB06-39FB-4897-BDCC-B84041DA9AB0"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su4:*:*:*:*:*:*:*","matchCriteriaId":"2E727720-92A8-430E-881F-091ACC71E87F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su5:*:*:*:*:*:*:*","matchCriteriaId":"511D0C5D-55DB-4293-BFE0-17D31073C5BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su6:*:*:*:*:*:*:*","matchCriteriaId":"294B9E10-2CF1-47D3-9725-E2A568E17AD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su7:*:*:*:*:*:*:*","matchCriteriaId":"397E6105-7508-4DEB-AD6D-1E702E31C875"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su7a:*:*:*:*:*:*:*","matchCriteriaId":"1DD5882F-47AD-44BF-BAF5-4DA6B59A45A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su8:*:*:*:*:*:*:*","matchCriteriaId":"65580374-43E4-4EB4-8D66-76FB8AF11568"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su8a:*:*:*:*:*:*:*","matchCriteriaId":"D501B7FB-1335-4C44-8C4F-DDF033A41E4A"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-kkHq43We","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}