A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by accessing the configuration interface, which may require a password, and then accessing the device's physical interface and inserting a USB storage device. A successful exploit could allow the attacker to execute arbitrary commands on the device in an elevated security context. At the time of publication, this vulnerability affected Cisco Small Business SPA500 Series IP Phones firmware releases 7.6.2SR5 and prior.

Project Subscriptions

Vendors Products
Spa500ds Subscribe
Spa500ds Firmware Subscribe
Spa500s Subscribe
Spa500s Firmware Subscribe
Spa501g Subscribe
Spa501g Firmware Subscribe
Spa502g Subscribe
Spa502g Firmware Subscribe
Spa504g Subscribe
Spa504g Firmware Subscribe
Spa508g Subscribe
Spa508g Firmware Subscribe
Spa509g Subscribe
Spa509g Firmware Subscribe
Spa512g Subscribe
Spa512g Firmware Subscribe
Spa514g Subscribe
Spa514g Firmware Subscribe
Spa525g2 Subscribe
Spa525g2 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10480 A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by accessing the configuration interface, which may require a password, and then accessing the device's physical interface and inserting a USB storage device. A successful exploit could allow the attacker to execute arbitrary commands on the device in an elevated security context. At the time of publication, this vulnerability affected Cisco Small Business SPA500 Series IP Phones firmware releases 7.6.2SR5 and prior.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 20 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-20T17:15:15.438Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1923

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:51.261Z

cve-icon NVD

Status : Modified

Published: 2019-07-17T21:15:12.170

Modified: 2024-11-21T04:37:41.697

Link: CVE-2019-1923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses