TROYANOSYVIRUS
Volver a CVEs

CVE-2024-20445

MEDIUM
5.3

Descripcion

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper storage of sensitive information within the web UI of Session Initiation Protocol (SIP)-based phone loads. An attacker could exploit this vulnerability by browsing to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information, including incoming and outgoing call records. Note: Web Access is disabled by default.

Detalles CVE

Puntuacion CVSS v3.15.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado11/6/2024
Ultima modificacion1/5/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

cisco:desk_phone_9841cisco:desk_phone_9841_firmwarecisco:desk_phone_9851cisco:desk_phone_9851_firmwarecisco:desk_phone_9861cisco:desk_phone_9861_firmwarecisco:desk_phone_9871cisco:desk_phone_9871_firmwarecisco:ip_conference_phone_7832cisco:ip_conference_phone_7832_firmwarecisco:ip_conference_phone_8831cisco:ip_conference_phone_8831_firmwarecisco:ip_conference_phone_8832cisco:ip_conference_phone_8832_firmwarecisco:ip_phone_7811cisco:ip_phone_7811_firmwarecisco:ip_phone_7821cisco:ip_phone_7821_firmwarecisco:ip_phone_7841cisco:ip_phone_7841_firmwarecisco:ip_phone_7861cisco:ip_phone_7861_firmwarecisco:ip_phone_8811cisco:ip_phone_8811_firmwarecisco:ip_phone_8841cisco:ip_phone_8841_firmwarecisco:ip_phone_8845cisco:ip_phone_8845_firmwarecisco:ip_phone_8851cisco:ip_phone_8851_firmwarecisco:ip_phone_8851nrcisco:ip_phone_8851nr_firmwarecisco:ip_phone_8861cisco:ip_phone_8861_firmwarecisco:video_phone_8875cisco:video_phone_8875_firmware

Debilidades (CWE)

CWE-200

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.