A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.

Project Subscriptions

Vendors Products
Ip Phone 7800 Subscribe
Ip Phone 7800 Firmware Subscribe
Ip Phone 7811 Subscribe
Ip Phone 7811 Firmware Subscribe
Ip Phone 7821 Subscribe
Ip Phone 7821 Firmware Subscribe
Ip Phone 7832 Subscribe
Ip Phone 7832 Firmware Subscribe
Ip Phone 7841 Subscribe
Ip Phone 7841 Firmware Subscribe
Ip Phone 7861 Subscribe
Ip Phone 7861 Firmware Subscribe
Ip Phone 8800 Subscribe
Ip Phone 8800 Firmware Subscribe
Ip Phone 8811 Subscribe
Ip Phone 8811 Firmware Subscribe
Ip Phone 8821 Subscribe
Ip Phone 8821-ex Subscribe
Ip Phone 8821-ex Firmware Subscribe
Ip Phone 8821 Firmware Subscribe
Ip Phone 8831 Subscribe
Ip Phone 8831 Firmware Subscribe
Ip Phone 8832 Subscribe
Ip Phone 8832 Firmware Subscribe
Ip Phone 8841 Subscribe
Ip Phone 8841 Firmware Subscribe
Ip Phone 8845 Subscribe
Ip Phone 8845 Firmware Subscribe
Ip Phone 8851 Subscribe
Ip Phone 8851 Firmware Subscribe
Ip Phone 8861 Subscribe
Ip Phone 8861 Firmware Subscribe
Ip Phone 8865 Subscribe
Ip Phone 8865 Firmware Subscribe
Ip Phones 8832 Subscribe
Ip Phones 8832 Firmware Subscribe
Unified Ip Phone 8851nr Subscribe
Unified Ip Phone 8851nr Firmware Subscribe
Unified Ip Phone 8865nr Subscribe
Unified Ip Phone 8865nr Firmware Subscribe
Wireless Ip Phone 8821 Subscribe
Wireless Ip Phone 8821-ex Subscribe
Wireless Ip Phone 8821-ex Firmware Subscribe
Wireless Ip Phone 8821 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24197 A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-02T08:57:35.086Z

Reserved: 2022-10-27T18:47:50.308Z

Link: CVE-2023-20018

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-01-20T07:15:13.633

Modified: 2024-11-21T07:40:21.247

Link: CVE-2023-20018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses