A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

Project Subscriptions

Vendors Products
Ip Conference Phone 7832 Subscribe
Ip Conference Phone 7832 Firmware Subscribe
Ip Conference Phone 7832 With Multiplatform Firmware Subscribe
Ip Conference Phone 8832 Subscribe
Ip Conference Phone 8832 Firmware Subscribe
Ip Conference Phone 8832 With Multiplatform Firmware Subscribe
Ip Phone 6821 Subscribe
Ip Phone 6821 Firmware Subscribe
Ip Phone 6841 Subscribe
Ip Phone 6841 Firmware Subscribe
Ip Phone 6851 Subscribe
Ip Phone 6851 Firmware Subscribe
Ip Phone 6861 Subscribe
Ip Phone 6861 Firmware Subscribe
Ip Phone 6871 Subscribe
Ip Phone 6871 Firmware Subscribe
Ip Phone 7811 Subscribe
Ip Phone 7811 Firmware Subscribe
Ip Phone 7811 With Multiplatform Firmware Subscribe
Ip Phone 7821 Subscribe
Ip Phone 7821 Firmware Subscribe
Ip Phone 7821 With Multiplatform Firmware Subscribe
Ip Phone 7841 Subscribe
Ip Phone 7841 Firmware Subscribe
Ip Phone 7841 With Multiplatform Firmware Subscribe
Ip Phone 7861 Subscribe
Ip Phone 7861 Firmware Subscribe
Ip Phone 7861 With Multiplatform Firmware Subscribe
Ip Phone 8811 Subscribe
Ip Phone 8811 Firmware Subscribe
Ip Phone 8811 With Multiplatform Firmware Subscribe
Ip Phone 8841 Subscribe
Ip Phone 8841 Firmware Subscribe
Ip Phone 8841 With Multiplatform Firmware Subscribe
Ip Phone 8845 Subscribe
Ip Phone 8845 Firmware Subscribe
Ip Phone 8845 With Multiplatform Firmware Subscribe
Ip Phone 8851 Subscribe
Ip Phone 8851 Firmware Subscribe
Ip Phone 8851 With Multiplatform Firmware Subscribe
Ip Phone 8861 Subscribe
Ip Phone 8861 Firmware Subscribe
Ip Phone 8861 With Multiplatform Firmware Subscribe
Ip Phone 8865 Subscribe
Ip Phone 8865 Firmware Subscribe
Ip Phone 8865 With Multiplatform Firmware Subscribe
Unified Ip Conference Phone 8831 Subscribe
Unified Ip Conference Phone 8831 Firmware Subscribe
Unified Ip Conference Phone 8831 For Third-party Call Control Subscribe
Unified Ip Conference Phone 8831 For Third-party Call Control Firmware Subscribe
Wireless Ip Phone 8821 Subscribe
Wireless Ip Phone 8821-ex Subscribe
Wireless Ip Phone 8821-ex Firmware Subscribe
Wireless Ip Phone 8821 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24382 A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:42:42.854Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3111

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.455Z

cve-icon NVD

Status : Modified

Published: 2020-02-05T18:15:10.783

Modified: 2024-11-21T05:30:20.897

Link: CVE-2020-3111

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses