// For flags

CVE-2019-1923

Cisco Small Business SPA500 Series IP Phones Local Command Execution Vulnerability

Severity Score

6.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by accessing the configuration interface, which may require a password, and then accessing the device's physical interface and inserting a USB storage device. A successful exploit could allow the attacker to execute arbitrary commands on the device in an elevated security context. At the time of publication, this vulnerability affected Cisco Small Business SPA500 Series IP Phones firmware releases 7.6.2SR5 and prior.

Una vulnerabilidad en los teléfonos IP Small Business SPA500 Series de Cisco podría permitir a un atacante físicamente próximo ejecutar comandos arbitrarios en el dispositivo. La vulnerabilidad es debido a una comprobación de entrada inapropiada en la interfaz de configuración del dispositivo. Un atacante podría explotar esta vulnerabilidad accediendo a la interfaz de configuración, que puede requerir una contraseña, y luego acceder a la interfaz física del dispositivo e insertar un dispositivo de almacenamiento USB. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios en el dispositivo en un contexto de seguridad elevado. Al momento de la publicación, esta vulnerabilidad afectó los teléfonos IP Small Business SPA500 Series de Cisco versiones de firmware 7.6.2SR5 y anteriores.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-07-17 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Spa501g Firmware
Search vendor "Cisco" for product "Spa501g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa501g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa501g
Search vendor "Cisco" for product "Spa501g"
--
Safe
Cisco
Search vendor "Cisco"
Spa502g Firmware
Search vendor "Cisco" for product "Spa502g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa502g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa502g
Search vendor "Cisco" for product "Spa502g"
--
Safe
Cisco
Search vendor "Cisco"
Spa504g Firmware
Search vendor "Cisco" for product "Spa504g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa504g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa504g
Search vendor "Cisco" for product "Spa504g"
--
Safe
Cisco
Search vendor "Cisco"
Spa508g Firmware
Search vendor "Cisco" for product "Spa508g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa508g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa508g
Search vendor "Cisco" for product "Spa508g"
--
Safe
Cisco
Search vendor "Cisco"
Spa509g Firmware
Search vendor "Cisco" for product "Spa509g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa509g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa509g
Search vendor "Cisco" for product "Spa509g"
--
Safe
Cisco
Search vendor "Cisco"
Spa512g Firmware
Search vendor "Cisco" for product "Spa512g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa512g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa512g
Search vendor "Cisco" for product "Spa512g"
--
Safe
Cisco
Search vendor "Cisco"
Spa514g Firmware
Search vendor "Cisco" for product "Spa514g Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa514g Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa514g
Search vendor "Cisco" for product "Spa514g"
--
Safe
Cisco
Search vendor "Cisco"
Spa525g2 Firmware
Search vendor "Cisco" for product "Spa525g2 Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa525g2 Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa525g2
Search vendor "Cisco" for product "Spa525g2"
--
Safe
Cisco
Search vendor "Cisco"
Spa500s Firmware
Search vendor "Cisco" for product "Spa500s Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa500s Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa500s
Search vendor "Cisco" for product "Spa500s"
--
Safe
Cisco
Search vendor "Cisco"
Spa500ds Firmware
Search vendor "Cisco" for product "Spa500ds Firmware"
<= 7.6.2sr5
Search vendor "Cisco" for product "Spa500ds Firmware" and version " <= 7.6.2sr5"
-
Affected
in Cisco
Search vendor "Cisco"
Spa500ds
Search vendor "Cisco" for product "Spa500ds"
--
Safe