A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Ata 187 Analog Telephone Adapter
Subscribe
Ata 187 Analog Telephone Adapter Firmware
Subscribe
Unified Ip Phone 6911
Subscribe
Unified Ip Phone 6911 Firmware
Subscribe
Unified Ip Phone 6921
Subscribe
Unified Ip Phone 6921 Firmware
Subscribe
Unified Ip Phone 6941
Subscribe
Unified Ip Phone 6941 Firmware
Subscribe
Unified Ip Phone 6945
Subscribe
Unified Ip Phone 6945 Firmware
Subscribe
Unified Ip Phone 6961
Subscribe
Unified Ip Phone 6961 Firmware
Subscribe
Unified Ip Phone 8941
Subscribe
Unified Ip Phone 8941 Firmware
Subscribe
Unified Ip Phone 8945
Subscribe
Unified Ip Phone 8945 Firmware
Subscribe
Unified Ip Phone 8961
Subscribe
Unified Ip Phone 8961 Firmware
Subscribe
Unified Ip Phone 9951
Subscribe
Unified Ip Phone 9951 Firmware
Subscribe
Unified Ip Phone 9971
Subscribe
Unified Ip Phone 9971 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-26067 | A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 01 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-01T19:02:31.240Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20817
Updated: 2024-08-03T02:24:49.918Z
Status : Modified
Published: 2022-06-15T18:15:08.997
Modified: 2024-11-21T06:43:36.787
Link: CVE-2022-20817
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD