TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2024-20445

MEDIUM
5.3

Beschreibung

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper storage of sensitive information within the web UI of Session Initiation Protocol (SIP)-based phone loads. An attacker could exploit this vulnerability by browsing to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information, including incoming and outgoing call records. Note: Web Access is disabled by default.

CVE Details

CVSS v3.1 Bewertung5.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht11/6/2024
Zuletzt geandert1/5/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

cisco:desk_phone_9841cisco:desk_phone_9841_firmwarecisco:desk_phone_9851cisco:desk_phone_9851_firmwarecisco:desk_phone_9861cisco:desk_phone_9861_firmwarecisco:desk_phone_9871cisco:desk_phone_9871_firmwarecisco:ip_conference_phone_7832cisco:ip_conference_phone_7832_firmwarecisco:ip_conference_phone_8831cisco:ip_conference_phone_8831_firmwarecisco:ip_conference_phone_8832cisco:ip_conference_phone_8832_firmwarecisco:ip_phone_7811cisco:ip_phone_7811_firmwarecisco:ip_phone_7821cisco:ip_phone_7821_firmwarecisco:ip_phone_7841cisco:ip_phone_7841_firmwarecisco:ip_phone_7861cisco:ip_phone_7861_firmwarecisco:ip_phone_8811cisco:ip_phone_8811_firmwarecisco:ip_phone_8841cisco:ip_phone_8841_firmwarecisco:ip_phone_8845cisco:ip_phone_8845_firmwarecisco:ip_phone_8851cisco:ip_phone_8851_firmwarecisco:ip_phone_8851nrcisco:ip_phone_8851nr_firmwarecisco:ip_phone_8861cisco:ip_phone_8861_firmwarecisco:video_phone_8875cisco:video_phone_8875_firmware

Schwachen (CWE)

CWE-200

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.