cve-2021-1379
Vulnerability from cvelistv5
Published
2024-11-18 15:42
Modified
2024-11-18 16:23
Summary
Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone. These vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Impacted products
Vendor Product Version
Cisco Cisco IP Phones with Multiplatform Firmware Version: 11.1.2
Version: 11.2.1
Version: 11.2.3
Version: 11.2.2
Version: 11.2.3 MSR1-1
Version: 11.1.2 MSR1-1
Version: 11.1.1
Version: 11.1.2 MSR3-1
Version: 11.0.0
Version: 11.1.1 MSR1-1
Version: 11.0.1
Version: 11.1.1 MSR2-1
Version: 11.2.4
Version: 11.0.1 MSR1-1
Version: 11.0.2
Version: 11.3.1
Version: 11.3.1 MSR1-3
Version: 11.3.2
Version: 11.3.1 MSR2-6
Version: 11.3.1 MSR3-3
Create a notification for this product.
   Cisco Cisco Session Initiation Protocol (SIP) Software Version: 9.0(3)
Version: 9.0(2)SR2
Version: 9.0(2)SR1
Version: 9.2(1)
Version: 9.4(2)SR1
Version: 9.4(2)
Version: 9.4(2)SR2
Version: 9.4(2)SR3
Version: 9.3(1)SR2
Version: 9.3(1)SR3
Version: 9.3(1)SR1
Version: 9.1(1)SR1
Version: 9.3(1)SR4
Version: 9.2(3)
Version: 9.2(1)SR2
Version: 9.3(1)
Version: 9.4(2)SR4
Version: 12.1(1)SR1
Version: 11.5(1)
Version: 10.3(2)
Version: 10.2(2)
Version: 10.3(1)
Version: 10.3(1)SR4
Version: 11.0(1)
Version: 10.4(1)SR2 3rd Party
Version: 11.7(1)
Version: 12.1(1)
Version: 11.0(0.7) MPP
Version: 9.3(4) 3rd Party
Version: 12.5(1)SR2
Version: 10.2(1)SR1
Version: 9.3(4)SR3 3rd Party
Version: 10.2(1)
Version: 12.5(1)
Version: 10.3(1)SR2
Version: 11-0-1MSR1-1
Version: 10.4(1) 3rd Party
Version: 12.5(1)SR1
Version: 11.5(1)SR1
Version: 10.1(1)SR2
Version: 12.0(1)SR2
Version: 12.6(1)
Version: 10.3(1.11) 3rd Party
Version: 12.0(1)
Version: 12.0(1)SR1
Version: 9.3(3)
Version: 12.5(1)SR3
Version: 10.3(1)SR4b
Version: 9.3(4)SR1 3rd Party
Version: 10.3(1)SR5
Version: 10.1(1.9)
Version: 10.3(1.9) 3rd Party
Version: 9.3(4)SR2 3rd Party
Version: 10.3(1)SR1
Version: 10.3(1)SR3
Version: 10.1(1)SR1
Version: 12.0(1)SR3
Version: 12.6(1)SR1
Version: 12.7(1)
Version: 10.3(1)SR6
Version: 12.8(1)
Version: 12.7(1)SR1
Version: 11.0(2)SR1
Version: 11.0(4)
Version: 11.0(2)
Version: 11.0(4)SR3
Version: 11.0(5)
Version: 11.0(3)SR2
Version: 11.0(3)SR4
Version: 11.0(3)SR3
Version: 11.0(2)SR2
Version: 11.0(4)SR1
Version: 11.0(5)SR3
Version: 11.0(3)
Version: 11.0(5)SR2
Version: 11.0(3)SR6
Version: 11.0(5)SR1
Version: 11.0(4)SR2
Version: 11.0(3)SR1
Version: 11.0(3)SR5
Create a notification for this product.
   Cisco Cisco Small Business IP Phones Version: 7.4.8
Version: 7.4.3
Version: 7.5.5a
Version: 7.3.7
Version: 7.5.2
Version: 7.5.1
Version: 7.4.6
Version: 7.5.7
Version: 7.4.4
Version: 7.6.2SR3
Version: 7.6.2
Version: 7.5.6
Version: 7.5.6c
Version: 7.6.0
Version: 7.4.7
Version: 7.6.2SR6
Version: 7.5.2b
Version: 7.5.5
Version: 7.5.6a
Version: 7.6.2SR2
Version: 7.5.3
Version: 7.5.2a
Version: 7.5.6(XU)
Version: 7.5.7s
Version: 7.6.2SR4
Version: 7.6.2SR1
Version: 7.4.9
Version: 7.5.5b
Version: 7.6.2SR5
Version: 7.5.4
Version: 7.6.1
Version: 7.6.2SR7
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-1379",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-18T16:22:56.651830Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-18T16:23:13.534Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Cisco IP Phones with Multiplatform Firmware",
               vendor: "Cisco",
               versions: [
                  {
                     status: "affected",
                     version: "11.1.2",
                  },
                  {
                     status: "affected",
                     version: "11.2.1",
                  },
                  {
                     status: "affected",
                     version: "11.2.3",
                  },
                  {
                     status: "affected",
                     version: "11.2.2",
                  },
                  {
                     status: "affected",
                     version: "11.2.3 MSR1-1",
                  },
                  {
                     status: "affected",
                     version: "11.1.2 MSR1-1",
                  },
                  {
                     status: "affected",
                     version: "11.1.1",
                  },
                  {
                     status: "affected",
                     version: "11.1.2 MSR3-1",
                  },
                  {
                     status: "affected",
                     version: "11.0.0",
                  },
                  {
                     status: "affected",
                     version: "11.1.1 MSR1-1",
                  },
                  {
                     status: "affected",
                     version: "11.0.1",
                  },
                  {
                     status: "affected",
                     version: "11.1.1 MSR2-1",
                  },
                  {
                     status: "affected",
                     version: "11.2.4",
                  },
                  {
                     status: "affected",
                     version: "11.0.1 MSR1-1",
                  },
                  {
                     status: "affected",
                     version: "11.0.2",
                  },
                  {
                     status: "affected",
                     version: "11.3.1",
                  },
                  {
                     status: "affected",
                     version: "11.3.1 MSR1-3",
                  },
                  {
                     status: "affected",
                     version: "11.3.2",
                  },
                  {
                     status: "affected",
                     version: "11.3.1 MSR2-6",
                  },
                  {
                     status: "affected",
                     version: "11.3.1 MSR3-3",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Cisco Session Initiation Protocol (SIP) Software",
               vendor: "Cisco",
               versions: [
                  {
                     status: "affected",
                     version: "9.0(3)",
                  },
                  {
                     status: "affected",
                     version: "9.0(2)SR2",
                  },
                  {
                     status: "affected",
                     version: "9.0(2)SR1",
                  },
                  {
                     status: "affected",
                     version: "9.2(1)",
                  },
                  {
                     status: "affected",
                     version: "9.4(2)SR1",
                  },
                  {
                     status: "affected",
                     version: "9.4(2)",
                  },
                  {
                     status: "affected",
                     version: "9.4(2)SR2",
                  },
                  {
                     status: "affected",
                     version: "9.4(2)SR3",
                  },
                  {
                     status: "affected",
                     version: "9.3(1)SR2",
                  },
                  {
                     status: "affected",
                     version: "9.3(1)SR3",
                  },
                  {
                     status: "affected",
                     version: "9.3(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "9.1(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "9.3(1)SR4",
                  },
                  {
                     status: "affected",
                     version: "9.2(3)",
                  },
                  {
                     status: "affected",
                     version: "9.2(1)SR2",
                  },
                  {
                     status: "affected",
                     version: "9.3(1)",
                  },
                  {
                     status: "affected",
                     version: "9.4(2)SR4",
                  },
                  {
                     status: "affected",
                     version: "12.1(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.5(1)",
                  },
                  {
                     status: "affected",
                     version: "10.3(2)",
                  },
                  {
                     status: "affected",
                     version: "10.2(2)",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR4",
                  },
                  {
                     status: "affected",
                     version: "11.0(1)",
                  },
                  {
                     status: "affected",
                     version: "10.4(1)SR2 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "11.7(1)",
                  },
                  {
                     status: "affected",
                     version: "12.1(1)",
                  },
                  {
                     status: "affected",
                     version: "11.0(0.7) MPP",
                  },
                  {
                     status: "affected",
                     version: "9.3(4) 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)SR2",
                  },
                  {
                     status: "affected",
                     version: "10.2(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "9.3(4)SR3 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "10.2(1)",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR2",
                  },
                  {
                     status: "affected",
                     version: "11-0-1MSR1-1",
                  },
                  {
                     status: "affected",
                     version: "10.4(1) 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.5(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "10.1(1)SR2",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)SR2",
                  },
                  {
                     status: "affected",
                     version: "12.6(1)",
                  },
                  {
                     status: "affected",
                     version: "10.3(1.11) 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "9.3(3)",
                  },
                  {
                     status: "affected",
                     version: "12.5(1)SR3",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR4b",
                  },
                  {
                     status: "affected",
                     version: "9.3(4)SR1 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR5",
                  },
                  {
                     status: "affected",
                     version: "10.1(1.9)",
                  },
                  {
                     status: "affected",
                     version: "10.3(1.9) 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "9.3(4)SR2 3rd Party",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR3",
                  },
                  {
                     status: "affected",
                     version: "10.1(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "12.0(1)SR3",
                  },
                  {
                     status: "affected",
                     version: "12.6(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "12.7(1)",
                  },
                  {
                     status: "affected",
                     version: "10.3(1)SR6",
                  },
                  {
                     status: "affected",
                     version: "12.8(1)",
                  },
                  {
                     status: "affected",
                     version: "12.7(1)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.0(2)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.0(4)",
                  },
                  {
                     status: "affected",
                     version: "11.0(2)",
                  },
                  {
                     status: "affected",
                     version: "11.0(4)SR3",
                  },
                  {
                     status: "affected",
                     version: "11.0(5)",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)SR2",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)SR4",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)SR3",
                  },
                  {
                     status: "affected",
                     version: "11.0(2)SR2",
                  },
                  {
                     status: "affected",
                     version: "11.0(4)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.0(5)SR3",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)",
                  },
                  {
                     status: "affected",
                     version: "11.0(5)SR2",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)SR6",
                  },
                  {
                     status: "affected",
                     version: "11.0(5)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.0(4)SR2",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)SR1",
                  },
                  {
                     status: "affected",
                     version: "11.0(3)SR5",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Cisco Small Business IP Phones",
               vendor: "Cisco",
               versions: [
                  {
                     status: "affected",
                     version: "7.4.8",
                  },
                  {
                     status: "affected",
                     version: "7.4.3",
                  },
                  {
                     status: "affected",
                     version: "7.5.5a",
                  },
                  {
                     status: "affected",
                     version: "7.3.7",
                  },
                  {
                     status: "affected",
                     version: "7.5.2",
                  },
                  {
                     status: "affected",
                     version: "7.5.1",
                  },
                  {
                     status: "affected",
                     version: "7.4.6",
                  },
                  {
                     status: "affected",
                     version: "7.5.7",
                  },
                  {
                     status: "affected",
                     version: "7.4.4",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR3",
                  },
                  {
                     status: "affected",
                     version: "7.6.2",
                  },
                  {
                     status: "affected",
                     version: "7.5.6",
                  },
                  {
                     status: "affected",
                     version: "7.5.6c",
                  },
                  {
                     status: "affected",
                     version: "7.6.0",
                  },
                  {
                     status: "affected",
                     version: "7.4.7",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR6",
                  },
                  {
                     status: "affected",
                     version: "7.5.2b",
                  },
                  {
                     status: "affected",
                     version: "7.5.5",
                  },
                  {
                     status: "affected",
                     version: "7.5.6a",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR2",
                  },
                  {
                     status: "affected",
                     version: "7.5.3",
                  },
                  {
                     status: "affected",
                     version: "7.5.2a",
                  },
                  {
                     status: "affected",
                     version: "7.5.6(XU)",
                  },
                  {
                     status: "affected",
                     version: "7.5.7s",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR4",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR1",
                  },
                  {
                     status: "affected",
                     version: "7.4.9",
                  },
                  {
                     status: "affected",
                     version: "7.5.5b",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR5",
                  },
                  {
                     status: "affected",
                     version: "7.5.4",
                  },
                  {
                     status: "affected",
                     version: "7.6.1",
                  },
                  {
                     status: "affected",
                     version: "7.6.2SR7",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone.\r\nThese vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:X/RC:X/E:X",
                  version: "3.1",
               },
               format: "cvssV3_1",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-120",
                     description: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
                     lang: "en",
                     type: "cwe",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-11-18T15:42:00.388Z",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "cisco-sa-ipphone-rce-dos-U2PsSkz3",
               url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3",
            },
            {
               name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3",
               url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3",
            },
         ],
         source: {
            advisory: "cisco-sa-ipphone-rce-dos-U2PsSkz3",
            defects: [
               "CSCvu59351",
            ],
            discovery: "EXTERNAL",
         },
         title: "Cisco IP Phones Cisco Discovery Protocol and Link Layer Discovery Protocol Remote Code Execution and Denial of Service Vulnerabilities",
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2021-1379",
      datePublished: "2024-11-18T15:42:00.388Z",
      dateReserved: "2020-11-13T00:00:00.000Z",
      dateUpdated: "2024-11-18T16:23:13.534Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2021-1379\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-11-18T16:15:09.310\",\"lastModified\":\"2024-11-18T17:11:17.393\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone.\\r\\nThese vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\"},{\"lang\":\"es\",\"value\":\"Varias vulnerabilidades en las implementaciones de Cisco Discovery Protocol y Link Layer Discovery Protocol (LLDP) para los teléfonos IP de Cisco de las series 68xx/78xx/88xx podrían permitir que un atacante adyacente no autenticado ejecute código de forma remota o provoque una recarga de un teléfono IP afectado. Estas vulnerabilidades se deben a la falta de comprobaciones cuando el teléfono IP procesa un paquete Cisco Discovery Protocol o LLDP. Un atacante podría explotar estas vulnerabilidades enviando un paquete Cisco Discovery Protocol o LLDP malicioso al teléfono IP de destino. Una explotación exitosa podría permitir al atacante ejecutar código en el teléfono IP afectado o hacer que se recargue inesperadamente, lo que resultaría en una condición de denegación de servicio (DoS). Nota: Cisco Discovery Protocol es un protocolo de capa 2. Para explotar estas vulnerabilidades, un atacante debe estar en el mismo dominio de difusión que el dispositivo afectado (adyacente a la capa 2). Cisco ha publicado actualizaciones de software que solucionan estas vulnerabilidades. No existen workarounds que solucionen estas vulnerabilidades.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3\",\"source\":\"ykramarz@cisco.com\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-1379\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-18T16:22:56.651830Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-18T16:23:00.881Z\"}}], \"cna\": {\"title\": \"Cisco IP Phones Cisco Discovery Protocol and Link Layer Discovery Protocol Remote Code Execution and Denial of Service Vulnerabilities\", \"source\": {\"defects\": [\"CSCvu59351\"], \"advisory\": \"cisco-sa-ipphone-rce-dos-U2PsSkz3\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:X/RC:X/E:X\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IP Phones with Multiplatform Firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.1.2\"}, {\"status\": \"affected\", \"version\": \"11.2.1\"}, {\"status\": \"affected\", \"version\": \"11.2.3\"}, {\"status\": \"affected\", \"version\": \"11.2.2\"}, {\"status\": \"affected\", \"version\": \"11.2.3 MSR1-1\"}, {\"status\": \"affected\", \"version\": \"11.1.2 MSR1-1\"}, {\"status\": \"affected\", \"version\": \"11.1.1\"}, {\"status\": \"affected\", \"version\": \"11.1.2 MSR3-1\"}, {\"status\": \"affected\", \"version\": \"11.0.0\"}, {\"status\": \"affected\", \"version\": \"11.1.1 MSR1-1\"}, {\"status\": \"affected\", \"version\": \"11.0.1\"}, {\"status\": \"affected\", \"version\": \"11.1.1 MSR2-1\"}, {\"status\": \"affected\", \"version\": \"11.2.4\"}, {\"status\": \"affected\", \"version\": \"11.0.1 MSR1-1\"}, {\"status\": \"affected\", \"version\": \"11.0.2\"}, {\"status\": \"affected\", \"version\": \"11.3.1\"}, {\"status\": \"affected\", \"version\": \"11.3.1 MSR1-3\"}, {\"status\": \"affected\", \"version\": \"11.3.2\"}, {\"status\": \"affected\", \"version\": \"11.3.1 MSR2-6\"}, {\"status\": \"affected\", \"version\": \"11.3.1 MSR3-3\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Session Initiation Protocol (SIP) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0(3)\"}, {\"status\": \"affected\", \"version\": \"9.0(2)SR2\"}, {\"status\": \"affected\", \"version\": \"9.0(2)SR1\"}, {\"status\": \"affected\", \"version\": \"9.2(1)\"}, {\"status\": \"affected\", \"version\": \"9.4(2)SR1\"}, {\"status\": \"affected\", \"version\": \"9.4(2)\"}, {\"status\": \"affected\", \"version\": \"9.4(2)SR2\"}, {\"status\": \"affected\", \"version\": \"9.4(2)SR3\"}, {\"status\": \"affected\", \"version\": \"9.3(1)SR2\"}, {\"status\": \"affected\", \"version\": \"9.3(1)SR3\"}, {\"status\": \"affected\", \"version\": \"9.3(1)SR1\"}, {\"status\": \"affected\", \"version\": \"9.1(1)SR1\"}, {\"status\": \"affected\", \"version\": \"9.3(1)SR4\"}, {\"status\": \"affected\", \"version\": \"9.2(3)\"}, {\"status\": \"affected\", \"version\": \"9.2(1)SR2\"}, {\"status\": \"affected\", \"version\": \"9.3(1)\"}, {\"status\": \"affected\", \"version\": \"9.4(2)SR4\"}, {\"status\": \"affected\", \"version\": \"12.1(1)SR1\"}, {\"status\": \"affected\", \"version\": \"11.5(1)\"}, {\"status\": \"affected\", \"version\": \"10.3(2)\"}, {\"status\": \"affected\", \"version\": \"10.2(2)\"}, {\"status\": \"affected\", \"version\": \"10.3(1)\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR4\"}, {\"status\": \"affected\", \"version\": \"11.0(1)\"}, {\"status\": \"affected\", \"version\": \"10.4(1)SR2 3rd Party\"}, {\"status\": \"affected\", \"version\": \"11.7(1)\"}, {\"status\": \"affected\", \"version\": \"12.1(1)\"}, {\"status\": \"affected\", \"version\": \"11.0(0.7) MPP\"}, {\"status\": \"affected\", \"version\": \"9.3(4) 3rd Party\"}, {\"status\": \"affected\", \"version\": \"12.5(1)SR2\"}, {\"status\": \"affected\", \"version\": \"10.2(1)SR1\"}, {\"status\": \"affected\", \"version\": \"9.3(4)SR3 3rd Party\"}, {\"status\": \"affected\", \"version\": \"10.2(1)\"}, {\"status\": \"affected\", \"version\": \"12.5(1)\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR2\"}, {\"status\": \"affected\", \"version\": \"11-0-1MSR1-1\"}, {\"status\": \"affected\", \"version\": \"10.4(1) 3rd Party\"}, {\"status\": \"affected\", \"version\": \"12.5(1)SR1\"}, {\"status\": \"affected\", \"version\": \"11.5(1)SR1\"}, {\"status\": \"affected\", \"version\": \"10.1(1)SR2\"}, {\"status\": \"affected\", \"version\": \"12.0(1)SR2\"}, {\"status\": \"affected\", \"version\": \"12.6(1)\"}, {\"status\": \"affected\", \"version\": \"10.3(1.11) 3rd Party\"}, {\"status\": \"affected\", \"version\": \"12.0(1)\"}, {\"status\": \"affected\", \"version\": \"12.0(1)SR1\"}, {\"status\": \"affected\", \"version\": \"9.3(3)\"}, {\"status\": \"affected\", \"version\": \"12.5(1)SR3\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR4b\"}, {\"status\": \"affected\", \"version\": \"9.3(4)SR1 3rd Party\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR5\"}, {\"status\": \"affected\", \"version\": \"10.1(1.9)\"}, {\"status\": \"affected\", \"version\": \"10.3(1.9) 3rd Party\"}, {\"status\": \"affected\", \"version\": \"9.3(4)SR2 3rd Party\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR1\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR3\"}, {\"status\": \"affected\", \"version\": \"10.1(1)SR1\"}, {\"status\": \"affected\", \"version\": \"12.0(1)SR3\"}, {\"status\": \"affected\", \"version\": \"12.6(1)SR1\"}, {\"status\": \"affected\", \"version\": \"12.7(1)\"}, {\"status\": \"affected\", \"version\": \"10.3(1)SR6\"}, {\"status\": \"affected\", \"version\": \"12.8(1)\"}, {\"status\": \"affected\", \"version\": \"12.7(1)SR1\"}, {\"status\": \"affected\", \"version\": \"11.0(2)SR1\"}, {\"status\": \"affected\", \"version\": \"11.0(4)\"}, {\"status\": \"affected\", \"version\": \"11.0(2)\"}, {\"status\": \"affected\", \"version\": \"11.0(4)SR3\"}, {\"status\": \"affected\", \"version\": \"11.0(5)\"}, {\"status\": \"affected\", \"version\": \"11.0(3)SR2\"}, {\"status\": \"affected\", \"version\": \"11.0(3)SR4\"}, {\"status\": \"affected\", \"version\": \"11.0(3)SR3\"}, {\"status\": \"affected\", \"version\": \"11.0(2)SR2\"}, {\"status\": \"affected\", \"version\": \"11.0(4)SR1\"}, {\"status\": \"affected\", \"version\": \"11.0(5)SR3\"}, {\"status\": \"affected\", \"version\": \"11.0(3)\"}, {\"status\": \"affected\", \"version\": \"11.0(5)SR2\"}, {\"status\": \"affected\", \"version\": \"11.0(3)SR6\"}, {\"status\": \"affected\", \"version\": \"11.0(5)SR1\"}, {\"status\": \"affected\", \"version\": \"11.0(4)SR2\"}, {\"status\": \"affected\", \"version\": \"11.0(3)SR1\"}, {\"status\": \"affected\", \"version\": \"11.0(3)SR5\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Small Business IP Phones\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.8\"}, {\"status\": \"affected\", \"version\": \"7.4.3\"}, {\"status\": \"affected\", \"version\": \"7.5.5a\"}, {\"status\": \"affected\", \"version\": \"7.3.7\"}, {\"status\": \"affected\", \"version\": \"7.5.2\"}, {\"status\": \"affected\", \"version\": \"7.5.1\"}, {\"status\": \"affected\", \"version\": \"7.4.6\"}, {\"status\": \"affected\", \"version\": \"7.5.7\"}, {\"status\": \"affected\", \"version\": \"7.4.4\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR3\"}, {\"status\": \"affected\", \"version\": \"7.6.2\"}, {\"status\": \"affected\", \"version\": \"7.5.6\"}, {\"status\": \"affected\", \"version\": \"7.5.6c\"}, {\"status\": \"affected\", \"version\": \"7.6.0\"}, {\"status\": \"affected\", \"version\": \"7.4.7\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR6\"}, {\"status\": \"affected\", \"version\": \"7.5.2b\"}, {\"status\": \"affected\", \"version\": \"7.5.5\"}, {\"status\": \"affected\", \"version\": \"7.5.6a\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR2\"}, {\"status\": \"affected\", \"version\": \"7.5.3\"}, {\"status\": \"affected\", \"version\": \"7.5.2a\"}, {\"status\": \"affected\", \"version\": \"7.5.6(XU)\"}, {\"status\": \"affected\", \"version\": \"7.5.7s\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR4\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR1\"}, {\"status\": \"affected\", \"version\": \"7.4.9\"}, {\"status\": \"affected\", \"version\": \"7.5.5b\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR5\"}, {\"status\": \"affected\", \"version\": \"7.5.4\"}, {\"status\": \"affected\", \"version\": \"7.6.1\"}, {\"status\": \"affected\", \"version\": \"7.6.2SR7\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco\\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3\", \"name\": \"cisco-sa-ipphone-rce-dos-U2PsSkz3\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone.\\r\\nThese vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-120\", \"description\": \"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-11-18T15:42:00.388Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2021-1379\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-18T16:23:13.534Z\", \"dateReserved\": \"2020-11-13T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-11-18T15:42:00.388Z\", \"assignerShortName\": \"cisco\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.