A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.

Project Subscriptions

Vendors Products
Spa112 Firmware Subscribe
Spa500 Firmware Subscribe
Spa500ds Subscribe
Spa500ds Firmware Subscribe
Spa500s Subscribe
Spa500s Firmware Subscribe
Spa501g Subscribe
Spa501g Firmware Subscribe
Spa502g Subscribe
Spa502g Firmware Subscribe
Spa504g Subscribe
Spa504g Firmware Subscribe
Spa508g Subscribe
Spa508g Firmware Subscribe
Spa509g Subscribe
Spa509g Firmware Subscribe
Spa512g Subscribe
Spa512g Firmware Subscribe
Spa514g Subscribe
Spa514g Firmware Subscribe
Spa525 Firmware Subscribe
Spa525g Subscribe
Spa525g Firmware Subscribe
Spa5x5 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10240 A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-21T19:44:31.986Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1683

cve-icon Vulnrichment

Updated: 2024-08-04T18:28:42.555Z

cve-icon NVD

Status : Modified

Published: 2019-02-25T17:29:00.280

Modified: 2024-11-21T04:37:05.440

Link: CVE-2019-1683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses