Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2024-AVI-0357
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Cisco IP Phone. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "IP Phone 6800 Series avec un microgiciel Multiplatform", "product": { "name": "IP Phone", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "IP Phone 8800 Series avec un microgiciel Multiplatform", "product": { "name": "IP Phone", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Video Phone 8875 en mode Multiplatform", "product": { "name": "IP Phone", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "IP Phone 7800 Series avec un microgiciel Multiplatform", "product": { "name": "IP Phone", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-20357", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20357" }, { "name": "CVE-2024-20376", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20376" }, { "name": "CVE-2024-20378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-20378" } ], "initial_release_date": "2024-05-02T00:00:00", "last_revision_date": "2024-05-02T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0357", "revisions": [ { "description": "Version initiale", "revision_date": "2024-05-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Cisco IP Phone.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9 et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Cisco IP Phone", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ipphone-multi-vulns-cXAhCvS du 01 mai 2024", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ] }
CVE-2024-20376 (GCVE-0-2024-20376)
Vulnerability from cvelistv5
Published
2024-05-01 16:43
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a DoS condition.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the affected device to reload.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: 11.3.1 MSR2-6 Version: 11.3.1 MSR3-3 Version: 11.3.2 Version: 11.3.3 Version: 11.3.1 MSR4-1 Version: 11.3.4 Version: 11.3.5 Version: 11.3.3 MSR2 Version: 11.3.3 MSR1 Version: 11.3.6 Version: 11-3-1MPPSR4UPG Version: 11.3.7 Version: 11-3-1MSR2UPG Version: 11.3.6SR1 Version: 11.3.7SR1 Version: 11.3.7SR2 Version: 11.0.0 Version: 11.0.1 Version: 11.0.1 MSR1-1 Version: 11.0.2 Version: 11.1.1 Version: 11.1.1 MSR1-1 Version: 11.1.1 MSR2-1 Version: 11.1.2 Version: 11.1.2 MSR1-1 Version: 11.1.2 MSR3-1 Version: 11.2.1 Version: 11.2.2 Version: 11.2.3 Version: 11.2.3 MSR1-1 Version: 11.2.4 Version: 11.3.1 Version: 11.3.1 MSR1-3 Version: 4.5 Version: 4.6 MSR1 Version: 4.7.1 Version: 4.8.1 Version: 4.8.1 SR1 Version: 5.0.1 Version: 12.0.1 Version: 12.0.2 Version: 12.0.3 Version: 12.0.3SR1 Version: 12.0.4 Version: 5.1.1 Version: 5.1.2 Version: 5.1(2)SR1 |
|||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6871_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6871_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6821_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6821_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6851_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6851_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7821_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6861_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6861_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6825_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6825_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6841_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6841_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7811_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7841_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7861_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_8800_series_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:video_phone_8875_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "video_phone_8875_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20376", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-01T20:50:33.825806Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:47:10.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.3.1 MSR2-6" }, { "status": "affected", "version": "11.3.1 MSR3-3" }, { "status": "affected", "version": "11.3.2" }, { "status": "affected", "version": "11.3.3" }, { "status": "affected", "version": "11.3.1 MSR4-1" }, { "status": "affected", "version": "11.3.4" }, { "status": "affected", "version": "11.3.5" }, { "status": "affected", "version": "11.3.3 MSR2" }, { "status": "affected", "version": "11.3.3 MSR1" }, { "status": "affected", "version": "11.3.6" }, { "status": "affected", "version": "11-3-1MPPSR4UPG" }, { "status": "affected", "version": "11.3.7" }, { "status": "affected", "version": "11-3-1MSR2UPG" }, { "status": "affected", "version": "11.3.6SR1" }, { "status": "affected", "version": "11.3.7SR1" }, { "status": "affected", "version": "11.3.7SR2" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.1 MSR1-1" }, { "status": "affected", "version": "11.0.2" }, { "status": "affected", "version": "11.1.1" }, { "status": "affected", "version": "11.1.1 MSR1-1" }, { "status": "affected", "version": "11.1.1 MSR2-1" }, { "status": "affected", "version": "11.1.2" }, { "status": "affected", "version": "11.1.2 MSR1-1" }, { "status": "affected", "version": "11.1.2 MSR3-1" }, { "status": "affected", "version": "11.2.1" }, { "status": "affected", "version": "11.2.2" }, { "status": "affected", "version": "11.2.3" }, { "status": "affected", "version": "11.2.3 MSR1-1" }, { "status": "affected", "version": "11.2.4" }, { "status": "affected", "version": "11.3.1" }, { "status": "affected", "version": "11.3.1 MSR1-3" }, { "status": "affected", "version": "4.5" }, { "status": "affected", "version": "4.6 MSR1" }, { "status": "affected", "version": "4.7.1" }, { "status": "affected", "version": "4.8.1" }, { "status": "affected", "version": "4.8.1 SR1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.2" }, { "status": "affected", "version": "12.0.3" }, { "status": "affected", "version": "12.0.3SR1" }, { "status": "affected", "version": "12.0.4" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1(2)SR1" } ] }, { "product": "Cisco PhoneOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a DoS condition. \r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the affected device to reload." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T16:43:15.553Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ], "source": { "advisory": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "defects": [ "CSCwi64103", "CSCwi64077" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20376", "datePublished": "2024-05-01T16:43:15.553Z", "dateReserved": "2023-11-08T15:08:07.655Z", "dateUpdated": "2024-08-01T21:59:42.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20357 (GCVE-0-2024-20357)
Vulnerability from cvelistv5
Published
2024-05-01 16:36
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A vulnerability in the XML service of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to initiate phone calls on an affected device.
This vulnerability exists because bounds-checking does not occur while parsing XML requests. An attacker could exploit this vulnerability by sending a crafted XML request to an affected device. A successful exploit could allow the attacker to initiate calls or play sounds on the device.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: 11.3.1 MSR2-6 Version: 11.3.1 MSR3-3 Version: 11.3.2 Version: 11.3.3 Version: 11.3.1 MSR4-1 Version: 11.3.4 Version: 11.3.5 Version: 11.3.3 MSR2 Version: 11.3.3 MSR1 Version: 11.3.6 Version: 11-3-1MPPSR4UPG Version: 11.3.7 Version: 11-3-1MSR2UPG Version: 11.3.6SR1 Version: 11.3.7SR1 Version: 11.3.7SR2 Version: 11.0.0 Version: 11.0.1 Version: 11.0.1 MSR1-1 Version: 11.0.2 Version: 11.1.1 Version: 11.1.1 MSR1-1 Version: 11.1.1 MSR2-1 Version: 11.1.2 Version: 11.1.2 MSR1-1 Version: 11.1.2 MSR3-1 Version: 11.2.1 Version: 11.2.2 Version: 11.2.3 Version: 11.2.3 MSR1-1 Version: 11.2.4 Version: 11.3.1 Version: 11.3.1 MSR1-3 Version: 4.5 Version: 4.6 MSR1 Version: 4.7.1 Version: 4.8.1 Version: 4.8.1 SR1 Version: 5.0.1 Version: 12.0.1 Version: 12.0.2 Version: 12.0.3 Version: 12.0.3SR1 Version: 12.0.4 Version: 5.1.1 Version: 5.1.2 Version: 5.1(2)SR1 |
|||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6871_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6871_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6821_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6821_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6851_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6851_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7821_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6861_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6861_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6825_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6825_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6841_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6841_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7811_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7841_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7861_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_8800_series_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:video_phone_8875_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "video_phone_8875_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20357", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-01T20:55:26.843678Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:45:13.942Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.3.1 MSR2-6" }, { "status": "affected", "version": "11.3.1 MSR3-3" }, { "status": "affected", "version": "11.3.2" }, { "status": "affected", "version": "11.3.3" }, { "status": "affected", "version": "11.3.1 MSR4-1" }, { "status": "affected", "version": "11.3.4" }, { "status": "affected", "version": "11.3.5" }, { "status": "affected", "version": "11.3.3 MSR2" }, { "status": "affected", "version": "11.3.3 MSR1" }, { "status": "affected", "version": "11.3.6" }, { "status": "affected", "version": "11-3-1MPPSR4UPG" }, { "status": "affected", "version": "11.3.7" }, { "status": "affected", "version": "11-3-1MSR2UPG" }, { "status": "affected", "version": "11.3.6SR1" }, { "status": "affected", "version": "11.3.7SR1" }, { "status": "affected", "version": "11.3.7SR2" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.1 MSR1-1" }, { "status": "affected", "version": "11.0.2" }, { "status": "affected", "version": "11.1.1" }, { "status": "affected", "version": "11.1.1 MSR1-1" }, { "status": "affected", "version": "11.1.1 MSR2-1" }, { "status": "affected", "version": "11.1.2" }, { "status": "affected", "version": "11.1.2 MSR1-1" }, { "status": "affected", "version": "11.1.2 MSR3-1" }, { "status": "affected", "version": "11.2.1" }, { "status": "affected", "version": "11.2.2" }, { "status": "affected", "version": "11.2.3" }, { "status": "affected", "version": "11.2.3 MSR1-1" }, { "status": "affected", "version": "11.2.4" }, { "status": "affected", "version": "11.3.1" }, { "status": "affected", "version": "11.3.1 MSR1-3" }, { "status": "affected", "version": "4.5" }, { "status": "affected", "version": "4.6 MSR1" }, { "status": "affected", "version": "4.7.1" }, { "status": "affected", "version": "4.8.1" }, { "status": "affected", "version": "4.8.1 SR1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.2" }, { "status": "affected", "version": "12.0.3" }, { "status": "affected", "version": "12.0.3SR1" }, { "status": "affected", "version": "12.0.4" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1(2)SR1" } ] }, { "product": "Cisco PhoneOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the XML service of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to initiate phone calls on an affected device. \r\n\r This vulnerability exists because bounds-checking does not occur while parsing XML requests. An attacker could exploit this vulnerability by sending a crafted XML request to an affected device. A successful exploit could allow the attacker to initiate calls or play sounds on the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T16:36:53.907Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ], "source": { "advisory": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "defects": [ "CSCwi64082", "CSCwi64064" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20357", "datePublished": "2024-05-01T16:36:53.907Z", "dateReserved": "2023-11-08T15:08:07.649Z", "dateUpdated": "2024-08-01T21:59:42.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20378 (GCVE-0-2024-20378)
Vulnerability from cvelistv5
Published
2024-05-01 16:41
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness
Summary
A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device.
This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affected device. A successful exploit could allow the attacker to gain unauthorized access to the device, enabling the recording of user credentials and traffic to and from the affected device, including VoIP calls that could be replayed.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Cisco | Cisco IP Phones with Multiplatform Firmware |
Version: 11.3.1 MSR2-6 Version: 11.3.1 MSR3-3 Version: 11.3.2 Version: 11.3.3 Version: 11.3.1 MSR4-1 Version: 11.3.4 Version: 11.3.5 Version: 11.3.3 MSR2 Version: 11.3.3 MSR1 Version: 11.3.6 Version: 11-3-1MPPSR4UPG Version: 11.3.7 Version: 11-3-1MSR2UPG Version: 11.3.6SR1 Version: 11.3.7SR1 Version: 11.3.7SR2 Version: 11.0.0 Version: 11.0.1 Version: 11.0.1 MSR1-1 Version: 11.0.2 Version: 11.1.1 Version: 11.1.1 MSR1-1 Version: 11.1.1 MSR2-1 Version: 11.1.2 Version: 11.1.2 MSR1-1 Version: 11.1.2 MSR3-1 Version: 11.2.1 Version: 11.2.2 Version: 11.2.3 Version: 11.2.3 MSR1-1 Version: 11.2.4 Version: 11.3.1 Version: 11.3.1 MSR1-3 Version: 4.5 Version: 4.6 MSR1 Version: 4.7.1 Version: 4.8.1 Version: 4.8.1 SR1 Version: 5.0.1 Version: 12.0.1 Version: 12.0.2 Version: 12.0.3 Version: 12.0.3SR1 Version: 12.0.4 Version: 5.1.1 Version: 5.1.2 Version: 5.1(2)SR1 |
|||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6871_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6871_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6821_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6821_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6851_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6851_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7821_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6861_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6861_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6825_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6825_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_6841_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_6841_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7811_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7841_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_7861_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ip_phone_8800_series_with_multiplatform_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:video_phone_8875_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "video_phone_8875_firmware", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "12.0.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20378", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-01T20:19:03.667220Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T13:47:37.828Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IP Phones with Multiplatform Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.3.1 MSR2-6" }, { "status": "affected", "version": "11.3.1 MSR3-3" }, { "status": "affected", "version": "11.3.2" }, { "status": "affected", "version": "11.3.3" }, { "status": "affected", "version": "11.3.1 MSR4-1" }, { "status": "affected", "version": "11.3.4" }, { "status": "affected", "version": "11.3.5" }, { "status": "affected", "version": "11.3.3 MSR2" }, { "status": "affected", "version": "11.3.3 MSR1" }, { "status": "affected", "version": "11.3.6" }, { "status": "affected", "version": "11-3-1MPPSR4UPG" }, { "status": "affected", "version": "11.3.7" }, { "status": "affected", "version": "11-3-1MSR2UPG" }, { "status": "affected", "version": "11.3.6SR1" }, { "status": "affected", "version": "11.3.7SR1" }, { "status": "affected", "version": "11.3.7SR2" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.1 MSR1-1" }, { "status": "affected", "version": "11.0.2" }, { "status": "affected", "version": "11.1.1" }, { "status": "affected", "version": "11.1.1 MSR1-1" }, { "status": "affected", "version": "11.1.1 MSR2-1" }, { "status": "affected", "version": "11.1.2" }, { "status": "affected", "version": "11.1.2 MSR1-1" }, { "status": "affected", "version": "11.1.2 MSR3-1" }, { "status": "affected", "version": "11.2.1" }, { "status": "affected", "version": "11.2.2" }, { "status": "affected", "version": "11.2.3" }, { "status": "affected", "version": "11.2.3 MSR1-1" }, { "status": "affected", "version": "11.2.4" }, { "status": "affected", "version": "11.3.1" }, { "status": "affected", "version": "11.3.1 MSR1-3" }, { "status": "affected", "version": "4.5" }, { "status": "affected", "version": "4.6 MSR1" }, { "status": "affected", "version": "4.7.1" }, { "status": "affected", "version": "4.8.1" }, { "status": "affected", "version": "4.8.1 SR1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.2" }, { "status": "affected", "version": "12.0.3" }, { "status": "affected", "version": "12.0.3SR1" }, { "status": "affected", "version": "12.0.4" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1(2)SR1" } ] }, { "product": "Cisco PhoneOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. \r\n\r This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affected device. A successful exploit could allow the attacker to gain unauthorized access to the device, enabling the recording of user credentials and traffic to and from the affected device, including VoIP calls that could be replayed." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "Authentication Bypass by Primary Weakness", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T16:41:52.385Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS" } ], "source": { "advisory": "cisco-sa-ipphone-multi-vulns-cXAhCvS", "defects": [ "CSCwi64037", "CSCwi64050" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20378", "datePublished": "2024-05-01T16:41:52.385Z", "dateReserved": "2023-11-08T15:08:07.655Z", "dateUpdated": "2024-08-01T21:59:42.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…