Описание
The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device.
Ссылки
- Broken Link
- Vendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Broken Link
- Vendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:cisco:unified_ip_phone_firmware_7906g:8.0\(4\):sr1:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:cisco:unified_ip_phone_firmware_7911g:8.0\(4\):sr1:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*
Конфигурация 3
Одновременно
cpe:2.3:o:cisco:unified_ip_phone_firmware_7941g:8.0\(4\):sr1:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*
Конфигурация 4
Одновременно
cpe:2.3:o:cisco:unified_ip_phone_firmware_7961g:8.0\(4\):sr1:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*
Конфигурация 5
Одновременно
cpe:2.3:o:cisco:unified_ip_phone_firmware_7970g:8.0\(4\):sr1:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_phone_7970g:-:*:*:*:*:*:*:*
Конфигурация 6
Одновременно
cpe:2.3:o:cisco:unified_ip_phone_firmware_7971g:8.0\(4\):sr1:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_phone_7971g:-:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04236
Низкий
10 Critical
CVSS2
Дефекты
CWE-798
Связанные уязвимости
github
почти 4 года назад
The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device.
EPSS
Процентиль: 89%
0.04236
Низкий
10 Critical
CVSS2
Дефекты
CWE-798