CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.7%
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly.
These vulnerabilities exist because HTTP packets are not properly checked for errors. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the remote interface of an affected device. A successful exploit could allow the attacker to cause a DoS condition on the device.
[
{
"vendor": "Cisco",
"product": "Cisco Small Business IP Phones",
"versions": [
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.6.2"
},
{
"status": "affected",
"version": "7.6.2SR3"
},
{
"status": "affected",
"version": "7.6.2SR6"
},
{
"status": "affected",
"version": "7.6.2SR2"
},
{
"status": "affected",
"version": "7.6.2SR4"
},
{
"status": "affected",
"version": "7.6.2SR1"
},
{
"status": "affected",
"version": "7.6.2SR5"
},
{
"status": "affected",
"version": "7.6.2SR7"
},
{
"status": "affected",
"version": "7.6.1"
},
{
"status": "affected",
"version": "7.3.7"
},
{
"status": "affected",
"version": "7.5.5"
},
{
"status": "affected",
"version": "7.5.6(XU)"
},
{
"status": "affected",
"version": "7.5.2"
},
{
"status": "affected",
"version": "7.5.2a"
},
{
"status": "affected",
"version": "7.5.7"
},
{
"status": "affected",
"version": "7.5.3"
},
{
"status": "affected",
"version": "7.5.6"
},
{
"status": "affected",
"version": "7.5.2b"
},
{
"status": "affected",
"version": "7.5.6c"
},
{
"status": "affected",
"version": "7.5.6a"
},
{
"status": "affected",
"version": "7.5.7s"
},
{
"status": "affected",
"version": "7.5.1"
},
{
"status": "affected",
"version": "7.5.5a"
},
{
"status": "affected",
"version": "7.5.5b"
},
{
"status": "affected",
"version": "7.5.4"
},
{
"status": "affected",
"version": "7.4.7"
},
{
"status": "affected",
"version": "7.4.4"
},
{
"status": "affected",
"version": "7.4.8"
},
{
"status": "affected",
"version": "7.4.3"
},
{
"status": "affected",
"version": "7.4.9"
},
{
"status": "affected",
"version": "7.4.6"
},
{
"status": "affected",
"version": "1.0.17"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.7%
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial