FKIE_CVE-2024-20378

Vulnerability from fkie_nvd - Published: 2024-05-01 17:15 - Updated: 2026-01-05 14:58
Summary
A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affected device. A successful exploit could allow the attacker to gain unauthorized access to the device, enabling the recording of user credentials and traffic to and from the affected device, including VoIP calls that could be replayed.
Impacted products
Vendor Product Version
cisco ip_phone_6821_with_multiplatform_firmware *
cisco ip_phone_6821_with_multiplatform_firmware 12.0.4
cisco ip_phone_6821 -
cisco ip_phone_6841_with_multiplatform_firmware *
cisco ip_phone_6841_with_multiplatform_firmware 12.0.4
cisco ip_phone_6841 -
cisco ip_phone_6851_with_multiplatform_firmware *
cisco ip_phone_6851_with_multiplatform_firmware 12.0.4
cisco ip_phone_6851 -
cisco ip_phone_6861_with_multiplatform_firmware *
cisco ip_phone_6861_with_multiplatform_firmware 12.0.4
cisco ip_phone_6861 -
cisco ip_phone_6871_with_multiplatform_firmware *
cisco ip_phone_6871_with_multiplatform_firmware 12.0.4
cisco ip_phone_6871 -
cisco ip_phone_7811_with_multiplatform_firmware *
cisco ip_phone_7811_with_multiplatform_firmware 12.0.4
cisco ip_phone_7811 -
cisco ip_phone_7821_with_multiplatform_firmware *
cisco ip_phone_7821_with_multiplatform_firmware 12.0.4
cisco ip_phone_7821 -
cisco ip_phone_7841_with_multiplatform_firmware *
cisco ip_phone_7841_with_multiplatform_firmware 12.0.4
cisco ip_phone_7841 -
cisco ip_phone_7861_with_multiplatform_firmware *
cisco ip_phone_7861_with_multiplatform_firmware 12.0.4
cisco ip_phone_7861 -
cisco ip_phone_8811_with_multiplatform_firmware *
cisco ip_phone_8811_with_multiplatform_firmware 12.0.4
cisco ip_phone_8811 -
cisco ip_phone_8841_with_multiplatform_firmware *
cisco ip_phone_8841_with_multiplatform_firmware 12.0.4
cisco ip_phone_8841 -
cisco ip_phone_8851_with_multiplatform_firmware *
cisco ip_phone_8851_with_multiplatform_firmware 12.0.4
cisco ip_phone_8851 -
cisco ip_phone_8851nr_with_multiplatform_firmware *
cisco ip_phone_8851nr_with_multiplatform_firmware 12.0.4
cisco ip_phone_8851nr -
cisco ip_phone_8861_with_multiplatform_firmware *
cisco ip_phone_8861_with_multiplatform_firmware 12.0.4
cisco ip_phone_8861 -
cisco video_phone_8875_with_multiplatform_firmware *
cisco video_phone_8875 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99E00AAC-CB3D-45BA-9E52-9B5A889726C0",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "CFC6D2B1-BD2D-4387-A8C1-4613BB054A2E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26BE10F-ED17-40AB-B3C6-3D95624F1011",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "E8A2684A-5312-4CAC-AB98-F83B312B7838",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2054AAAB-3B2E-451A-B8C1-655AB78364AD",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "B1D9BC6F-C8AC-4D72-98CE-3915BDC2410C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7270E157-5129-41D2-8FF0-6985F8BD065C",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "A2D27343-7B78-433A-868A-50201A55D0A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E81465FF-4D35-4DA4-8891-C1ECDC610645",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "42F2218A-97AD-48F3-A27F-2A87FF018BC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E669CBF7-8BDC-457E-BA16-4114379AF277",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "3BF2960F-A6A1-467D-AAA0-1797C10DE41E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1ABF689-2719-48F2-951C-1D3AA4F76DA6",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "9E2CE8E4-9A73-4039-B4A4-35A1D4E20054",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9118944-DCB3-4BBB-B3E3-BF14D3B83CB5",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "A9B4B0A7-EFAB-41A6-B27D-A230F5159B08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C636FD-2276-4A16-8AF9-14947A6151CF",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "68B089A1-4399-4B9A-A87A-33CFFB75792A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "913E381D-E55A-477B-8B11-6371D5D7D730",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "7194BD83-49D1-4414-8C2D-505CED8533D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52407A0F-B4C8-4B43-AFFE-81121B0EECB3",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "9A41AF72-BF00-4327-B874-53FC4770608E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58281D77-D913-4DE8-834C-492F39E2A5E9",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "35341B23-2B89-4338-8230-C9161805EBAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851nr_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4675BB-0014-49C3-AC13-2B1A6E5EDCEF",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851nr_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "5AF84F2A-23B6-49FE-BA6D-D19A0881CD3B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8851nr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BB2274-7668-4B80-9FF2-EC724C44685B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2641C26C-DF8D-440B-9ECF-0C9C8076F3A4",
              "versionEndExcluding": "12.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:12.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "C2957580-9796-4F04-B04B-A534BACE2AA0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:video_phone_8875_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1E6F12-9864-4137-8E47-532D26584611",
              "versionEndExcluding": "2.3.1.0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:video_phone_8875:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC9019DD-6941-42F3-8B66-1F3CDDDA86E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device.  \r\n\r This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affected device. A successful exploit could allow the attacker to gain unauthorized access to the device, enabling the recording of user credentials and traffic to and from the affected device, including VoIP calls that could be replayed."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del tel\u00e9fono IP de Cisco podr\u00eda permitir que un atacante remoto no autenticado recupere informaci\u00f3n confidencial de un dispositivo afectado. Esta vulnerabilidad se debe a la falta de autenticaci\u00f3n para endpoints espec\u00edficos de la interfaz de administraci\u00f3n basada en web en un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad conect\u00e1ndose al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener acceso no autorizado al dispositivo, lo que permitir\u00eda registrar las credenciales del usuario y el tr\u00e1fico hacia y desde el dispositivo afectado, incluidas las llamadas VoIP que podr\u00edan reproducirse."
    }
  ],
  "id": "CVE-2024-20378",
  "lastModified": "2026-01-05T14:58:02.673",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-01T17:15:28.660",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-305"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…