A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Spa112
Subscribe
Spa112 Firmware
Subscribe
Spa500
Subscribe
Spa500 Firmware
Subscribe
Spa500ds
Subscribe
Spa500ds Firmware
Subscribe
Spa500s
Subscribe
Spa500s Firmware
Subscribe
Spa501g
Subscribe
Spa501g Firmware
Subscribe
Spa502g
Subscribe
Spa502g Firmware
Subscribe
Spa504g
Subscribe
Spa504g Firmware
Subscribe
Spa508g
Subscribe
Spa508g Firmware
Subscribe
Spa509g
Subscribe
Spa509g Firmware
Subscribe
Spa512g
Subscribe
Spa512g Firmware
Subscribe
Spa514g
Subscribe
Spa514g Firmware
Subscribe
Spa525
Subscribe
Spa525 Firmware
Subscribe
Spa525g
Subscribe
Spa525g Firmware
Subscribe
Spa5x5
Subscribe
Spa5x5 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10240 | A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 21 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-21T19:44:31.986Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1683
Updated: 2024-08-04T18:28:42.555Z
Status : Modified
Published: 2019-02-25T17:29:00.280
Modified: 2024-11-21T04:37:05.440
Link: CVE-2019-1683
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD