CVE-2023-20018
20.01.2023, 07:15
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | ip_phone_7800_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_7811_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_7821_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_7832_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_7841_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_7861_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8800_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8811_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8821_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8821-ex_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8831_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8832_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8841_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8845_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8851_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8861_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phone_8865_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | ip_phones_8832_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | unified_ip_phone_8851nr_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | unified_ip_phone_8865nr_firmware | 𝑥 < 14.1\(1\)sr2 |
cisco | wireless_ip_phone_8821_firmware | 𝑥 < 11.0\(6\)sr4 |
cisco | wireless_ip_phone_8821-ex_firmware | 𝑥 < 11.0\(6\)sr4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-288 - Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.