The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-20259

CVE-2023-20259: Cisco Emergency Responder DoS Vulnerability

CVE-2023-20259 is a denial of service vulnerability in Cisco Emergency Responder caused by improper API authentication. Attackers can trigger high CPU utilization affecting management access and call processing.

Published: February 4, 2026

CVE-2023-20259 Overview

A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device.

This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.

Critical Impact

Unauthenticated remote attackers can cause denial of service conditions affecting call processing and management access across critical enterprise communications infrastructure.

Affected Products

  • Cisco Emergency Responder 14su3
  • Cisco Prime Collaboration Deployment 14su3
  • Cisco Unified Communications Manager 12.5(1)su7 and 14su3
  • Cisco Unified Communications Manager IM & Presence Service 12.5(1)su7 and 14su3
  • Cisco Unity Connection 14su3

Discovery Timeline

  • October 4, 2023 - CVE-2023-20259 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-20259

Vulnerability Analysis

CVE-2023-20259 is classified as a Resource Exhaustion vulnerability (CWE-400) affecting the API endpoint of multiple Cisco Unified Communications products. The vulnerability allows unauthenticated remote attackers to trigger high CPU utilization by sending specially crafted HTTP requests to a vulnerable API endpoint.

The attack is network-based and requires no privileges or user interaction, making it particularly dangerous in enterprise environments where Cisco Unified Communications products are often internet-facing or accessible from broad network segments. While the vulnerability does not compromise confidentiality or integrity, the availability impact is significant—affecting both user traffic (call processing) and administrative access to the web-based management interface.

Notably, the affected API is not used for device management and is unlikely to be utilized during normal device operations, which may reduce the likelihood of detection through routine monitoring. The device will recover automatically once the attack ceases, indicating that the DoS condition is transient and does not cause permanent damage to the system.

Root Cause

The root cause of this vulnerability stems from two related issues: improper API authentication and incomplete validation of API requests. The affected API endpoint fails to properly authenticate incoming requests, allowing unauthenticated users to interact with the API. Additionally, the API does not adequately validate request parameters, enabling malformed or specially crafted requests to consume excessive CPU resources.

This combination of authentication bypass and input validation flaws creates conditions where an attacker can repeatedly submit resource-intensive requests without authorization, leading to CPU exhaustion and subsequent denial of service.

Attack Vector

The attack vector for CVE-2023-20259 is network-based, requiring the attacker to have network access to the vulnerable Cisco Unified Communications product. The exploitation process involves:

  1. Reconnaissance: The attacker identifies a target running a vulnerable version of Cisco Unified Communications Manager, Emergency Responder, Prime Collaboration Deployment, IM & Presence Service, or Unity Connection.

  2. Crafted Request Submission: The attacker sends specially crafted HTTP requests to the specific vulnerable API endpoint. These requests are designed to trigger intensive processing operations on the server.

  3. Resource Exhaustion: The device processes these malformed requests, consuming excessive CPU resources. As CPU utilization increases, legitimate users experience degraded service quality.

  4. Service Impact: The denial of service manifests as delays in call processing and reduced accessibility to the web-based management interface, impacting both end-users and administrators.

The attack does not require authentication, making it accessible to any attacker with network connectivity to the target system. For detailed technical information about the specific API endpoint and request format, refer to the Cisco Security Advisory.

Detection Methods for CVE-2023-20259

Indicators of Compromise

  • Unusual spikes in CPU utilization on Cisco Unified Communications products without corresponding legitimate traffic increases
  • Multiple HTTP requests to uncommonly used API endpoints from single or distributed source IP addresses
  • User reports of call processing delays or dropped connections
  • Administrators experiencing slow or unresponsive web-based management interfaces
  • Abnormal HTTP request patterns in access logs targeting specific API endpoints

Detection Strategies

  • Implement network-based intrusion detection rules to identify high-volume HTTP requests targeting Cisco UC API endpoints
  • Configure CPU utilization thresholds with alerting on Cisco Unified Communications appliances to detect resource exhaustion attacks
  • Monitor web server access logs for anomalous request patterns, particularly to non-standard or administrative API endpoints
  • Deploy behavioral analysis tools to baseline normal API usage and alert on deviations

Monitoring Recommendations

  • Enable SNMP monitoring for CPU and memory utilization metrics on all affected Cisco UC products
  • Implement centralized logging with real-time correlation to identify attack patterns across multiple systems
  • Configure alerting for web-based management interface availability degradation
  • Review access logs periodically for unauthorized API access attempts from unexpected source addresses

How to Mitigate CVE-2023-20259

Immediate Actions Required

  • Review the Cisco Security Advisory for specific fixed software versions and upgrade guidance
  • Identify all instances of affected Cisco Unified Communications products in your environment and determine their current software versions
  • Prioritize patching for internet-facing or externally accessible Cisco UC deployments
  • Implement network access controls to restrict API endpoint access to authorized management networks only

Patch Information

Cisco has released software updates that address this vulnerability. Organizations should consult the Cisco Security Advisory (cisco-sa-cucm-apidos-PGsDcdNF) for detailed information on fixed software releases for each affected product. The advisory provides specific version information for:

  • Cisco Emergency Responder
  • Cisco Prime Collaboration Deployment
  • Cisco Unified Communications Manager
  • Cisco Unified Communications Manager IM & Presence Service
  • Cisco Unity Connection

Workarounds

  • Implement firewall rules or access control lists to restrict access to the vulnerable API endpoint from untrusted networks
  • Deploy a web application firewall (WAF) or reverse proxy to filter and rate-limit requests to Cisco UC API endpoints
  • Segment Cisco Unified Communications infrastructure on isolated network segments with strict ingress/egress controls
  • Monitor and implement IP-based blocking for source addresses exhibiting attack patterns
bash
# Example ACL configuration to restrict API access (adapt to your environment)
# Restrict HTTP/HTTPS access to management interfaces from trusted networks only
access-list CUCM_MGMT_ACL permit tcp 10.0.0.0 0.255.255.255 host 192.168.1.100 eq 443
access-list CUCM_MGMT_ACL deny tcp any host 192.168.1.100 eq 443
access-list CUCM_MGMT_ACL deny tcp any host 192.168.1.100 eq 80

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechCisco Unified Communications Manager

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.14%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-400

  • NVD-CWE-noinfo
  • Vendor Resources
  • Cisco Security Advisory
  • Related CVEs
  • CVE-2024-20375: Cisco Unified Communications Manager DoS

  • CVE-2023-20116: Cisco Unified Communications Manager DoS

  • CVE-2026-20045: Cisco Unified Communications Manager RCE

  • CVE-2025-20309: Cisco Unified CM Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English