Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in Cisco Voice Products