// For flags

CVE-2019-1716

Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability exists because the software improperly validates user-supplied input during user authentication. An attacker could exploit this vulnerability by connecting to an affected device using HTTP and supplying malicious user credentials. A successful exploit could allow the attacker to trigger a reload of an affected device, resulting in a DoS condition, or to execute arbitrary code with the privileges of the app user. Cisco fixed this vulnerability in the following SIP Software releases: 10.3(1)SR5 and later for Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 and later for Cisco Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 and later for the rest of the Cisco IP Phone 7800 Series and 8800 Series.

Una vulnerabilidad en la interfaz de gestión web de SIP (Session Initiation Protocol) de los teléfonos Cisco IP de la serie 7800 podría permitir que un atacante remoto no autenticado provoque una denegación de servicio (DoS) o ejecute código arbitrario. La vulnerabilidad existe debido a que el software valida incorrectamente las entradas proporcionadas por el usuario durante la autenticación de usuario. Un atacante podría explotar esta vulnerabilidad conectándose a un dispositivo afectado mediante HTTP y proporcionando credenciales maliciosas de usuario. Su explotación con éxito podría permitir que el atacante desencadene la recarga de un dispositivo afectado, lo que resulta en una condición de denegación de servicio (DoS), o ejecute código arbitrario con los privilegios del usuario de la app. Cisco solucionó esta vulnerabilidad en los siguientes lanzamientos de software SIP: 10.3(1)SR5 y siguientes para Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 y siguientes para Cisco Wireless IP Phone 8821 y 8821-EX; y 12.5(1)SR1 y siguientes para el resto de Cisco IP Phone 7800 Series y 8800 Series.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-03-22 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ip Phone 8821 Firmware
Search vendor "Cisco" for product "Ip Phone 8821 Firmware"
< 11.0\(4\)sr3
Search vendor "Cisco" for product "Ip Phone 8821 Firmware" and version " < 11.0\(4\)sr3"
-
Affected
in Cisco
Search vendor "Cisco"
Ip Phone 8821
Search vendor "Cisco" for product "Ip Phone 8821"
--
Safe
Cisco
Search vendor "Cisco"
Ip Phone 8821-ex Firmware
Search vendor "Cisco" for product "Ip Phone 8821-ex Firmware"
< 11.0\(4\)sr3
Search vendor "Cisco" for product "Ip Phone 8821-ex Firmware" and version " < 11.0\(4\)sr3"
-
Affected
in Cisco
Search vendor "Cisco"
Ip Phone 8821-ex
Search vendor "Cisco" for product "Ip Phone 8821-ex"
--
Safe
Cisco
Search vendor "Cisco"
Ip Conference Phone 7800 Firmware
Search vendor "Cisco" for product "Ip Conference Phone 7800 Firmware"
< 12.5\(1\)sr1
Search vendor "Cisco" for product "Ip Conference Phone 7800 Firmware" and version " < 12.5\(1\)sr1"
-
Affected
in Cisco
Search vendor "Cisco"
Ip Conference Phone 7800
Search vendor "Cisco" for product "Ip Conference Phone 7800"
--
Safe
Cisco
Search vendor "Cisco"
Ip Phone 8800 Firmware
Search vendor "Cisco" for product "Ip Phone 8800 Firmware"
< 12.5\(1\)sr1
Search vendor "Cisco" for product "Ip Phone 8800 Firmware" and version " < 12.5\(1\)sr1"
-
Affected
in Cisco
Search vendor "Cisco"
Ip Phone 8800
Search vendor "Cisco" for product "Ip Phone 8800"
--
Safe
Cisco
Search vendor "Cisco"
Unified Ip Conferenece Phone 8831 Firmware
Search vendor "Cisco" for product "Unified Ip Conferenece Phone 8831 Firmware"
< 10.3\(1\)sr5
Search vendor "Cisco" for product "Unified Ip Conferenece Phone 8831 Firmware" and version " < 10.3\(1\)sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Unified Ip Conferenece Phone 8831
Search vendor "Cisco" for product "Unified Ip Conferenece Phone 8831"
--
Safe