Lucene search

K
ciscoCiscoCISCO-SA-IPPHONE-ARBFILEREAD-NPDTE2OW
HistoryOct 06, 2021 - 4:00 p.m.

Cisco IP Phone Software Arbitrary File Read Vulnerability

2021-10-0616:00:00
tools.cisco.com
34

0.0004 Low

EPSS

Percentile

10.0%

A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system.

This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow”]

Affected configurations

Vulners
Node
ciscoip_phone_7811_with_multiplatform_firmwareMatchany
OR
ciscosession_initiation_protocol_\(sip\)_firmwareMatchany
OR
ciscoip_phone_7811_with_multiplatform_firmwareMatchany
OR
ciscosession_initiation_protocol_\(sip\)_firmwareMatchany

0.0004 Low

EPSS

Percentile

10.0%

Related for CISCO-SA-IPPHONE-ARBFILEREAD-NPDTE2OW