Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition.
For more information about these vulnerabilities, see the Details [“#details”] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ip_phone_6825_with_multiplatform_firmware | any | cpe:2.3:o:cisco:ip_phone_6825_with_multiplatform_firmware:any:*:*:*:*:*:*:* |
cisco | session_initiation_protocol_\(sip\)_firmware | any | cpe:2.3:a:cisco:session_initiation_protocol_\(sip\)_firmware:any:*:*:*:*:*:*:* |