Description
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Published: 2020-02-05
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24382 A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Ip Conference Phone 7832 Ip Conference Phone 7832 Firmware Ip Conference Phone 7832 With Multiplatform Firmware Ip Conference Phone 8832 Ip Conference Phone 8832 Firmware Ip Conference Phone 8832 With Multiplatform Firmware Ip Phone 6821 Ip Phone 6821 Firmware Ip Phone 6841 Ip Phone 6841 Firmware Ip Phone 6851 Ip Phone 6851 Firmware Ip Phone 6861 Ip Phone 6861 Firmware Ip Phone 6871 Ip Phone 6871 Firmware Ip Phone 7811 Ip Phone 7811 Firmware Ip Phone 7811 With Multiplatform Firmware Ip Phone 7821 Ip Phone 7821 Firmware Ip Phone 7821 With Multiplatform Firmware Ip Phone 7841 Ip Phone 7841 Firmware Ip Phone 7841 With Multiplatform Firmware Ip Phone 7861 Ip Phone 7861 Firmware Ip Phone 7861 With Multiplatform Firmware Ip Phone 8811 Ip Phone 8811 Firmware Ip Phone 8811 With Multiplatform Firmware Ip Phone 8841 Ip Phone 8841 Firmware Ip Phone 8841 With Multiplatform Firmware Ip Phone 8845 Ip Phone 8845 Firmware Ip Phone 8845 With Multiplatform Firmware Ip Phone 8851 Ip Phone 8851 Firmware Ip Phone 8851 With Multiplatform Firmware Ip Phone 8861 Ip Phone 8861 Firmware Ip Phone 8861 With Multiplatform Firmware Ip Phone 8865 Ip Phone 8865 Firmware Ip Phone 8865 With Multiplatform Firmware Unified Ip Conference Phone 8831 Unified Ip Conference Phone 8831 Firmware Unified Ip Conference Phone 8831 For Third-party Call Control Unified Ip Conference Phone 8831 For Third-party Call Control Firmware Wireless Ip Phone 8821 Wireless Ip Phone 8821-ex Wireless Ip Phone 8821-ex Firmware Wireless Ip Phone 8821 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:42:42.854Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3111

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.455Z

cve-icon NVD

Status : Modified

Published: 2020-02-05T18:15:10.783

Modified: 2024-11-21T05:30:20.897

Link: CVE-2020-3111

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses