A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2022-06-15T17:55:32.726275Z
Updated: 2024-11-01T19:02:31.240Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20817
Vulnrichment
Updated: 2024-08-03T02:24:49.918Z
NVD
Status : Modified
Published: 2022-06-15T18:15:08.997
Modified: 2024-11-21T06:43:36.787
Link: CVE-2022-20817
Redhat
No data.