A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by accessing the configuration interface, which may require a password, and then accessing the device's physical interface and inserting a USB storage device. A successful exploit could allow the attacker to execute arbitrary commands on the device in an elevated security context. At the time of publication, this vulnerability affected Cisco Small Business SPA500 Series IP Phones firmware releases 7.6.2SR5 and prior.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Spa500ds
Subscribe
Spa500ds Firmware
Subscribe
Spa500s
Subscribe
Spa500s Firmware
Subscribe
Spa501g
Subscribe
Spa501g Firmware
Subscribe
Spa502g
Subscribe
Spa502g Firmware
Subscribe
Spa504g
Subscribe
Spa504g Firmware
Subscribe
Spa508g
Subscribe
Spa508g Firmware
Subscribe
Spa509g
Subscribe
Spa509g Firmware
Subscribe
Spa512g
Subscribe
Spa512g Firmware
Subscribe
Spa514g
Subscribe
Spa514g Firmware
Subscribe
Spa525g2
Subscribe
Spa525g2 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10480 | A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by accessing the configuration interface, which may require a password, and then accessing the device's physical interface and inserting a USB storage device. A successful exploit could allow the attacker to execute arbitrary commands on the device in an elevated security context. At the time of publication, this vulnerability affected Cisco Small Business SPA500 Series IP Phones firmware releases 7.6.2SR5 and prior. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 20 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-20T17:15:15.438Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1923
Updated: 2024-08-04T18:35:51.261Z
Status : Modified
Published: 2019-07-17T21:15:12.170
Modified: 2024-11-21T04:37:41.697
Link: CVE-2019-1923
No data.
OpenCVE Enrichment
No data.
EUVD