A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.

Project Subscriptions

Vendors Products
Ata 187 Analog Telephone Adapter Subscribe
Ata 187 Analog Telephone Adapter Firmware Subscribe
Unified Ip Phone 6911 Subscribe
Unified Ip Phone 6911 Firmware Subscribe
Unified Ip Phone 6921 Subscribe
Unified Ip Phone 6921 Firmware Subscribe
Unified Ip Phone 6941 Subscribe
Unified Ip Phone 6941 Firmware Subscribe
Unified Ip Phone 6945 Subscribe
Unified Ip Phone 6945 Firmware Subscribe
Unified Ip Phone 6961 Subscribe
Unified Ip Phone 6961 Firmware Subscribe
Unified Ip Phone 8941 Subscribe
Unified Ip Phone 8941 Firmware Subscribe
Unified Ip Phone 8945 Subscribe
Unified Ip Phone 8945 Firmware Subscribe
Unified Ip Phone 8961 Subscribe
Unified Ip Phone 8961 Firmware Subscribe
Unified Ip Phone 9951 Subscribe
Unified Ip Phone 9951 Firmware Subscribe
Unified Ip Phone 9971 Subscribe
Unified Ip Phone 9971 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-26067 A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 01 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-01T19:02:31.240Z

Reserved: 2021-11-02T00:00:00

Link: CVE-2022-20817

cve-icon Vulnrichment

Updated: 2024-08-03T02:24:49.918Z

cve-icon NVD

Status : Modified

Published: 2022-06-15T18:15:08.997

Modified: 2024-11-21T06:43:36.787

Link: CVE-2022-20817

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses