CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
85.3%
The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | unified_ip_phone_firmware_7906g | 8.0(4) | cpe:2.3:o:cisco:unified_ip_phone_firmware_7906g:8.0\(4\):sr1:*:*:*:*:*:* |
cisco | unified_ip_phone_7906g | - | cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:* |
cisco | unified_ip_phone_firmware_7911g | 8.0(4) | cpe:2.3:o:cisco:unified_ip_phone_firmware_7911g:8.0\(4\):sr1:*:*:*:*:*:* |
cisco | unified_ip_phone_7911g | - | cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:* |
cisco | unified_ip_phone_firmware_7941g | 8.0(4) | cpe:2.3:o:cisco:unified_ip_phone_firmware_7941g:8.0\(4\):sr1:*:*:*:*:*:* |
cisco | unified_ip_phone_7941g | - | cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:* |
cisco | unified_ip_phone_firmware_7961g | 8.0(4) | cpe:2.3:o:cisco:unified_ip_phone_firmware_7961g:8.0\(4\):sr1:*:*:*:*:*:* |
cisco | unified_ip_phone_7961g | - | cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:* |
cisco | unified_ip_phone_firmware_7970g | 8.0(4) | cpe:2.3:o:cisco:unified_ip_phone_firmware_7970g:8.0\(4\):sr1:*:*:*:*:*:* |
cisco | unified_ip_phone_7970g | - | cpe:2.3:h:cisco:unified_ip_phone_7970g:-:*:*:*:*:*:*:* |
osvdb.org/45246
secunia.com/advisories/24262
www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml
www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml
www.securityfocus.com/bid/22647
www.securitytracker.com/id?1017681
www.vupen.com/english/advisories/2007/0689
exchange.xforce.ibmcloud.com/vulnerabilities/32627