A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.
History

Fri, 01 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2022-06-15T17:55:32.726275Z

Updated: 2024-11-01T19:02:31.240Z

Reserved: 2021-11-02T00:00:00

Link: CVE-2022-20817

cve-icon Vulnrichment

Updated: 2024-08-03T02:24:49.918Z

cve-icon NVD

Status : Modified

Published: 2022-06-15T18:15:08.997

Modified: 2024-11-21T06:43:36.787

Link: CVE-2022-20817

cve-icon Redhat

No data.