var-201606-0283
Vulnerability from variot
The license-certificate upload functionality on Cisco 8800 phones with software 11.0(1) allows remote authenticated users to delete arbitrary files via an invalid file, aka Bug ID CSCuz03010. The Cisco IP Phone 8800 Series is a 8000 series IP telephony product from Cisco. The product provides voice and video capabilities. This issue is being tracked by Cisco Bug ID CSCuz03010
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0283", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ip phone 8800 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0\\(1\\)" }, { "model": "ip phone 8800 series", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "11.0(1)" }, { "model": "ip phones", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "880011.0(1)" }, { "model": "ip phone 8800", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNNVD", "id": "CNNVD-201606-478" }, { "db": "NVD", "id": "CVE-2016-1434" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ip_phone_8800_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-003319" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "91320" } ], "trust": 0.3 }, "cve": "CVE-2016-1434", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2016-1434", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2016-04235", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-90253", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2016-1434", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1434", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-1434", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2016-04235", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201606-478", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90253", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "VULHUB", "id": "VHN-90253" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNNVD", "id": "CNNVD-201606-478" }, { "db": "NVD", "id": "CVE-2016-1434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The license-certificate upload functionality on Cisco 8800 phones with software 11.0(1) allows remote authenticated users to delete arbitrary files via an invalid file, aka Bug ID CSCuz03010. The Cisco IP Phone 8800 Series is a 8000 series IP telephony product from Cisco. The product provides voice and video capabilities. \nThis issue is being tracked by Cisco Bug ID CSCuz03010", "sources": [ { "db": "NVD", "id": "CVE-2016-1434" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "BID", "id": "91320" }, { "db": "VULHUB", "id": "VHN-90253" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1434", "trust": 3.4 }, { "db": "SECTRACK", "id": "1036139", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-003319", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201606-478", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-04235", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2016.1563", "trust": 0.6 }, { "db": "BID", "id": "91320", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-90253", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "VULHUB", "id": "VHN-90253" }, { "db": "BID", "id": "91320" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNNVD", "id": "CNNVD-201606-478" }, { "db": "NVD", "id": "CVE-2016-1434" } ] }, "id": "VAR-201606-0283", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "VULHUB", "id": "VHN-90253" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" } ] }, "last_update_date": "2024-11-23T22:07:49.239000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160620-ip-phone", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-ip-phone" }, { "title": "CiscoIPPhone8800Series Directory Traversal Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/78007" }, { "title": "Cisco IP Phone 8800 Series Fixes for directory traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62404" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNNVD", "id": "CNNVD-201606-478" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90253" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "NVD", "id": "CVE-2016-1434" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160620-ip-phone/" }, { "trust": 1.1, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160620-ip-phone" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036139" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1434" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1434" }, { "trust": 0.6, "url": "http://www.auscert.org.au/./render.html?it=36054" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "VULHUB", "id": "VHN-90253" }, { "db": "BID", "id": "91320" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNNVD", "id": "CNNVD-201606-478" }, { "db": "NVD", "id": "CVE-2016-1434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "VULHUB", "id": "VHN-90253" }, { "db": "BID", "id": "91320" }, { "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "db": "CNNVD", "id": "CNNVD-201606-478" }, { "db": "NVD", "id": "CVE-2016-1434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-04235" }, { "date": "2016-06-23T00:00:00", "db": "VULHUB", "id": "VHN-90253" }, { "date": "2016-06-20T00:00:00", "db": "BID", "id": "91320" }, { "date": "2016-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "date": "2016-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201606-478" }, { "date": "2016-06-23T00:59:03.190000", "db": "NVD", "id": "CVE-2016-1434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-04235" }, { "date": "2016-11-30T00:00:00", "db": "VULHUB", "id": "VHN-90253" }, { "date": "2016-07-06T15:01:00", "db": "BID", "id": "91320" }, { "date": "2016-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-003319" }, { "date": "2016-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201606-478" }, { "date": "2024-11-21T02:46:26.197000", "db": "NVD", "id": "CVE-2016-1434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-478" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IP Phone 8800 Series Directory Traversal Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-04235" }, { "db": "CNNVD", "id": "CNNVD-201606-478" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201606-478" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…