A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Ip Conference Phone 7832
Subscribe
Ip Conference Phone 7832 Firmware
Subscribe
Ip Conference Phone 7832 With Multiplatform Firmware
Subscribe
Ip Conference Phone 8832
Subscribe
Ip Conference Phone 8832 Firmware
Subscribe
Ip Conference Phone 8832 With Multiplatform Firmware
Subscribe
Ip Phone 6821
Subscribe
Ip Phone 6821 Firmware
Subscribe
Ip Phone 6841
Subscribe
Ip Phone 6841 Firmware
Subscribe
Ip Phone 6851
Subscribe
Ip Phone 6851 Firmware
Subscribe
Ip Phone 6861
Subscribe
Ip Phone 6861 Firmware
Subscribe
Ip Phone 6871
Subscribe
Ip Phone 6871 Firmware
Subscribe
Ip Phone 7811
Subscribe
Ip Phone 7811 Firmware
Subscribe
Ip Phone 7811 With Multiplatform Firmware
Subscribe
Ip Phone 7821
Subscribe
Ip Phone 7821 Firmware
Subscribe
Ip Phone 7821 With Multiplatform Firmware
Subscribe
Ip Phone 7841
Subscribe
Ip Phone 7841 Firmware
Subscribe
Ip Phone 7841 With Multiplatform Firmware
Subscribe
Ip Phone 7861
Subscribe
Ip Phone 7861 Firmware
Subscribe
Ip Phone 7861 With Multiplatform Firmware
Subscribe
Ip Phone 8811
Subscribe
Ip Phone 8811 Firmware
Subscribe
Ip Phone 8811 With Multiplatform Firmware
Subscribe
Ip Phone 8841
Subscribe
Ip Phone 8841 Firmware
Subscribe
Ip Phone 8841 With Multiplatform Firmware
Subscribe
Ip Phone 8845
Subscribe
Ip Phone 8845 Firmware
Subscribe
Ip Phone 8845 With Multiplatform Firmware
Subscribe
Ip Phone 8851
Subscribe
Ip Phone 8851 Firmware
Subscribe
Ip Phone 8851 With Multiplatform Firmware
Subscribe
Ip Phone 8861
Subscribe
Ip Phone 8861 Firmware
Subscribe
Ip Phone 8861 With Multiplatform Firmware
Subscribe
Ip Phone 8865
Subscribe
Ip Phone 8865 Firmware
Subscribe
Ip Phone 8865 With Multiplatform Firmware
Subscribe
Unified Ip Conference Phone 8831
Subscribe
Unified Ip Conference Phone 8831 Firmware
Subscribe
Unified Ip Conference Phone 8831 For Third-party Call Control
Subscribe
Unified Ip Conference Phone 8831 For Third-party Call Control Firmware
Subscribe
Wireless Ip Phone 8821
Subscribe
Wireless Ip Phone 8821-ex
Subscribe
Wireless Ip Phone 8821-ex Firmware
Subscribe
Wireless Ip Phone 8821 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24382 | A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 15 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-15T17:42:42.854Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3111
Updated: 2024-08-04T07:24:00.455Z
Status : Modified
Published: 2020-02-05T18:15:10.783
Modified: 2024-11-21T05:30:20.897
Link: CVE-2020-3111
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD