cisco-sa-ip-phone-info-disc-frdjfoxa
Vulnerability from csaf_cisco
Published
2022-01-12 16:00
Modified
2022-01-12 16:00
Summary
Cisco IP Phones Information Disclosure Vulnerability

Notes

Summary
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerable Products
At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable firmware release: IP Conference Phone 7832 IP Conference Phone 8832 IP Phones 7811, 7821, 7841, and 7861 IP Phones 8811, 8841, 8845, 8851, 8861, and 8865 Unified IP Conference Phone 8831 Unified IP Conference Phone 8831 for Third-Party Call Control Unified IP Phones 7945G, 7965G, and 7975G Unified SIP Phone 3905 Wireless IP Phones 8821 and 8821-EX For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software ["#fs"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: ATA 190, 191, 192 Analog Telephone Adapters IP Conference Phone 7832 with Multiplatform Firmware IP Conference Phone 8832 with Multiplatform Firmware IP DECT 110 Repeater IP DECT 110 Repeater with Multiplatform Firmware IP Phone DECT 6800 Series with Multiplatform Firmware IP Phones 6821, 6841, 6851, 6861, and 6871 with Multiplatform Firmware IP Phones 7811, 7821, 7841, and 7861 with Multiplatform Firmware IP Phones 8811, 8841, 8845, 8851, 8861, and 8865 with Multiplatform Firmware Unified IP Phones 6901 and 6911 Webex Desk Series devices Webex Room Phone Webex Share devices Webex Wireless Phones 840 and 860
Workarounds
There are no workarounds that address this vulnerability.
Fixed Software
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability described in this advisory and which release included the fix for this vulnerability. Cisco Product Cisco Bug ID First Fixed Release IP Conference Phone 7832 IP Conference Phone 8832 IP Phones 7811, 7821, 7841, and 7861 IP Phones 8811, 8841,8845, 8851, 8861, and 8865 CSCvy39057 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39057"] 14.1(1) Unified IP Conference Phone 8831 Unified IP Conference Phone 8831 for Third-Party Call Control CSCvy39054 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39054"] End of software maintenance. No fix available. See the next section. Unified IP Phones 7945G, 7965G, and 7975G CSCvy39059 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39059"] End of software maintenance. No fix available. See the next section. Unified SIP Phone 3905 CSCvy39055 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39055"] 9.4(1)SR5 Wireless IP Phones 8821 and 8821-EX CSCvy39058 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39058"] 11.0(6)SR2 Unified IP Conference Phone 8831 and 8831 for Third-Party Call Control and Unified IP Phones 7945G, 7965G, and 7975G Cisco has not released and will not release firmware updates to address the vulnerability described in this advisory. The Cisco Unified IP Conference Phone 8831 and 8831 for Third-Party Call Control as well as Cisco Unified IP Phones 7945G, 7965G, and 7975G have entered the end-of-life process. Customers are advised to refer to the end-of-life notices for these products: End-of-Sale and End-of-Life Announcement for the Cisco IP Conference Phone 8831 for on-premise and accessories ["https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-conference-phone-8831/eos-eol-notice-c51-741241.html"] End-of-Sale and End-of-Life Announcement for the Cisco IP Conference Phone 8831 for Multiplatform Phones and Accessories ["https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/ip-phone-8800-series-multiplatform-firmware/eos-eol-notice-c51-742916.html"] End-of-Sale and End-of-Life Announcement for the Cisco Unified IP Phones 7945, 7965, 7975 and 7916 ["https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7900-series/eos-eol-notice-c51-740078.html"] Customers are encouraged to migrate to the products listed in the end-of-life notices. When considering a device migration, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the new device will be sufficient for their network needs, the new devices contain sufficient memory, and that current hardware and software configurations will continue to be supported properly by the new product. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Source
Cisco would like to thank Gerhard Hechenberger and Steffen Robertz of the SEC Consult Vulnerability Lab for reporting this vulnerability.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.



{
  "document": {
    "acknowledgments": [
      {
        "summary": "Cisco would like to thank Gerhard Hechenberger and Steffen Robertz of the SEC Consult Vulnerability Lab for reporting this vulnerability."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "notes": [
      {
        "category": "summary",
        "text": "A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device.\r\n\r\nThis vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable firmware release:\r\n\r\nIP Conference Phone 7832\r\nIP Conference Phone 8832\r\nIP Phones 7811, 7821, 7841, and 7861\r\nIP Phones 8811, 8841, 8845, 8851, 8861, and 8865\r\nUnified IP Conference Phone 8831\r\nUnified IP Conference Phone 8831 for Third-Party Call Control\r\nUnified IP Phones 7945G, 7965G, and 7975G\r\nUnified SIP Phone 3905\r\nWireless IP Phones 8821 and 8821-EX\r\n\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.",
        "title": "Vulnerable Products"
      },
      {
        "category": "general",
        "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nATA 190, 191, 192  Analog Telephone Adapters\r\nIP Conference Phone 7832 with Multiplatform Firmware\r\nIP Conference Phone 8832 with Multiplatform Firmware\r\nIP DECT 110 Repeater\r\nIP DECT 110 Repeater with Multiplatform Firmware\r\nIP Phone DECT 6800 Series with Multiplatform Firmware\r\nIP Phones 6821, 6841, 6851, 6861, and 6871 with Multiplatform Firmware\r\nIP Phones 7811, 7821, 7841, and 7861 with Multiplatform Firmware\r\nIP Phones 8811, 8841, 8845, 8851, 8861, and 8865 with Multiplatform Firmware\r\nUnified IP Phones 6901 and 6911\r\nWebex Desk Series devices\r\nWebex Room Phone\r\nWebex Share devices\r\nWebex Wireless Phones 840 and 860",
        "title": "Products Confirmed Not Vulnerable"
      },
      {
        "category": "general",
        "text": "There are no workarounds that address this vulnerability.",
        "title": "Workarounds"
      },
      {
        "category": "general",
        "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n      Fixed Releases\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability described in this advisory and which release included the fix for this vulnerability.\r\n        Cisco Product  Cisco Bug ID  First Fixed Release          IP Conference Phone 7832\r\nIP Conference Phone 8832\r\nIP Phones 7811, 7821, 7841, and 7861\r\nIP Phones 8811, 8841,8845, 8851, 8861, and 8865  CSCvy39057 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39057\"]  14.1(1)      Unified IP Conference Phone 8831\r\nUnified IP Conference Phone 8831 for Third-Party Call Control  CSCvy39054 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39054\"]  End of software maintenance. No fix available. See the next section.       Unified IP Phones 7945G, 7965G, and 7975G  CSCvy39059 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39059\"]  End of software maintenance. No fix available. See the next section.       Unified SIP Phone 3905  CSCvy39055 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39055\"]  9.4(1)SR5      Wireless IP Phones 8821 and 8821-EX  CSCvy39058 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39058\"]  11.0(6)SR2\r\n   Unified IP Conference Phone 8831 and 8831 for Third-Party Call Control and Unified IP Phones 7945G, 7965G, and 7975G\r\nCisco has not released and will not release firmware updates to address the vulnerability described in this advisory. The Cisco Unified IP Conference Phone 8831 and 8831 for Third-Party Call Control as well as Cisco Unified IP Phones 7945G, 7965G, and 7975G have entered the end-of-life process. Customers are advised to refer to the end-of-life notices for these products:\r\n\r\nEnd-of-Sale and End-of-Life Announcement for the Cisco IP Conference Phone 8831 for on-premise and accessories [\"https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-conference-phone-8831/eos-eol-notice-c51-741241.html\"]\r\nEnd-of-Sale and End-of-Life Announcement for the Cisco IP Conference Phone 8831 for Multiplatform Phones and Accessories [\"https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/ip-phone-8800-series-multiplatform-firmware/eos-eol-notice-c51-742916.html\"]\r\nEnd-of-Sale and End-of-Life Announcement for the Cisco Unified IP Phones 7945, 7965, 7975 and 7916 [\"https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7900-series/eos-eol-notice-c51-740078.html\"]\r\n\r\nCustomers are encouraged to migrate to the products listed in the end-of-life notices.\r\n\r\nWhen considering a device migration, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the new device will be sufficient for their network needs, the new devices contain sufficient memory, and that current hardware and software configurations will continue to be supported properly by the new product. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.",
        "title": "Fixed Software"
      },
      {
        "category": "general",
        "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
        "title": "Vulnerability Policy"
      },
      {
        "category": "general",
        "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
        "title": "Exploitation and Public Announcements"
      },
      {
        "category": "general",
        "text": "Cisco would like to thank Gerhard Hechenberger and Steffen Robertz of the SEC Consult Vulnerability Lab for reporting this vulnerability.",
        "title": "Source"
      },
      {
        "category": "legal_disclaimer",
        "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
        "title": "Legal Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@cisco.com",
      "issuing_authority": "Cisco PSIRT",
      "name": "Cisco",
      "namespace": "https://wwww.cisco.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "Cisco IP Phones Information Disclosure Vulnerability",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA"
      },
      {
        "category": "external",
        "summary": "Cisco Security Vulnerability Policy",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
      },
      {
        "category": "external",
        "summary": "considering software upgrades",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
      },
      {
        "category": "external",
        "summary": "Cisco\u0026nbsp;Security Advisories page",
        "url": "https://www.cisco.com/go/psirt"
      },
      {
        "category": "external",
        "summary": "CSCvy39057",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39057"
      },
      {
        "category": "external",
        "summary": "CSCvy39054",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39054"
      },
      {
        "category": "external",
        "summary": "CSCvy39059",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39059"
      },
      {
        "category": "external",
        "summary": "CSCvy39055",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39055"
      },
      {
        "category": "external",
        "summary": "CSCvy39058",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy39058"
      },
      {
        "category": "external",
        "summary": "End-of-Sale and End-of-Life Announcement for the Cisco\u0026nbsp;IP Conference Phone 8831 for on-premise and accessories",
        "url": "https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-conference-phone-8831/eos-eol-notice-c51-741241.html"
      },
      {
        "category": "external",
        "summary": "End-of-Sale and End-of-Life Announcement for the Cisco\u0026nbsp;IP Conference Phone 8831 for Multiplatform Phones and Accessories",
        "url": "https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/ip-phone-8800-series-multiplatform-firmware/eos-eol-notice-c51-742916.html"
      },
      {
        "category": "external",
        "summary": "End-of-Sale and End-of-Life Announcement for the Cisco\u0026nbsp;Unified IP Phones 7945, 7965, 7975 and 7916",
        "url": "https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7900-series/eos-eol-notice-c51-740078.html"
      }
    ],
    "title": "Cisco IP Phones Information Disclosure Vulnerability",
    "tracking": {
      "current_release_date": "2022-01-12T16:00:00+00:00",
      "generator": {
        "date": "2024-05-10T23:12:27+00:00",
        "engine": {
          "name": "TVCE"
        }
      },
      "id": "cisco-sa-ip-phone-info-disc-fRdJfOxA",
      "initial_release_date": "2022-01-12T16:00:00+00:00",
      "revision_history": [
        {
          "date": "2022-01-12T15:36:11+00:00",
          "number": "1.0.0",
          "summary": "Initial public release."
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_family",
            "name": "Cisco Session Initiation Protocol (SIP) Software",
            "product": {
              "name": "Cisco Session Initiation Protocol (SIP) Software ",
              "product_id": "CSAFPID-277608"
            }
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-20660",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvy39035"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvy39054"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvy39057"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvy39059"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvy39058"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvy39055"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-277608"
        ]
      },
      "release_date": "2022-01-12T16:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-277608"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-277608"
          ]
        }
      ],
      "title": "Cisco IP Phones Information Disclosure Vulnerability"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.