Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20451
HistoryAug 07, 2024 - 4:48 p.m.

CVE-2024-20451

2024-08-0716:48:37
cisco
github.com
4
cisco
ip phones
vulnerabilities
web-based management
dos
http packets

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly.

These vulnerabilities exist because HTTP packets are not properly checked for errors. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the remote interface of an affected device. A successful exploit could allow the attacker to cause a DoS condition on the device.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Small Business IP Phones",
    "versions": [
      {
        "status": "affected",
        "version": "7.6.0"
      },
      {
        "status": "affected",
        "version": "7.6.2"
      },
      {
        "status": "affected",
        "version": "7.6.2SR3"
      },
      {
        "status": "affected",
        "version": "7.6.2SR6"
      },
      {
        "status": "affected",
        "version": "7.6.2SR2"
      },
      {
        "status": "affected",
        "version": "7.6.2SR4"
      },
      {
        "status": "affected",
        "version": "7.6.2SR1"
      },
      {
        "status": "affected",
        "version": "7.6.2SR5"
      },
      {
        "status": "affected",
        "version": "7.6.2SR7"
      },
      {
        "status": "affected",
        "version": "7.6.1"
      },
      {
        "status": "affected",
        "version": "7.3.7"
      },
      {
        "status": "affected",
        "version": "7.5.5"
      },
      {
        "status": "affected",
        "version": "7.5.6(XU)"
      },
      {
        "status": "affected",
        "version": "7.5.2"
      },
      {
        "status": "affected",
        "version": "7.5.2a"
      },
      {
        "status": "affected",
        "version": "7.5.7"
      },
      {
        "status": "affected",
        "version": "7.5.3"
      },
      {
        "status": "affected",
        "version": "7.5.6"
      },
      {
        "status": "affected",
        "version": "7.5.2b"
      },
      {
        "status": "affected",
        "version": "7.5.6c"
      },
      {
        "status": "affected",
        "version": "7.5.6a"
      },
      {
        "status": "affected",
        "version": "7.5.7s"
      },
      {
        "status": "affected",
        "version": "7.5.1"
      },
      {
        "status": "affected",
        "version": "7.5.5a"
      },
      {
        "status": "affected",
        "version": "7.5.5b"
      },
      {
        "status": "affected",
        "version": "7.5.4"
      },
      {
        "status": "affected",
        "version": "7.4.7"
      },
      {
        "status": "affected",
        "version": "7.4.4"
      },
      {
        "status": "affected",
        "version": "7.4.8"
      },
      {
        "status": "affected",
        "version": "7.4.3"
      },
      {
        "status": "affected",
        "version": "7.4.9"
      },
      {
        "status": "affected",
        "version": "7.4.6"
      },
      {
        "status": "affected",
        "version": "1.0.17"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-20451