You are here
Home > Preporuke > Ranjvost Cisco IP telefona

Ranjvost Cisco IP telefona

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Web UI Command Injection Vulnerability

Advisory ID: cisco-sa-20180711-phone-webui-inject

Revision: 1.0

For Public Release: 2018 July 11 16:00 GMT

Last Updated: 2018 July 11 16:00 GMT

CVE ID(s): CVE-2018-0341

CVSS Score v(3): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server.

The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject”]

—–BEGIN PGP SIGNATURE—–
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=HD5B
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacisjkog sustava

Otkriveni su sigurnosni nedostaci u jezgri operacijskog sustava RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju curenje informacija ili izvođenje napada uskraćivanjem...

Close