ID

VAR-201006-0362


CVE

CVE-2010-2291


TITLE

snom VoIP Phone of Web Vulnerability that circumvents interface restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2010-005529

DESCRIPTION

Unspecified vulnerability in the web interface in snom VoIP Phone firmware 8 before 8.2.35 allows remote attackers to bypass intended restrictions and modify user credentials via unknown vectors. NOTE: some of these details are obtained from third party information. Attackers can exploit this issue to bypass certain security restrictions and edit user credentials. snom VoIP phone firmware versions prior to 8.2.35 are vulnerable. ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Snom VoIP Phone Firmware User Interface Security Bypass SECUNIA ADVISORY ID: SA37635 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/37635/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=37635 RELEASE DATE: 2010-06-11 DISCUSS ADVISORY: http://secunia.com/advisories/37635/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/37635/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=37635 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Snom VoIP Phone Firmware, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is reported in 8.2 releases prior to 8.2.35. SOLUTION: Update to version 8.2.35. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://wiki.snom.com/Firmware/V8/Release_Notes/8.2.35 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2010-2291 // JVNDB: JVNDB-2010-005529 // BID: 40771 // VULHUB: VHN-44896 // PACKETSTORM: 90499

AFFECTED PRODUCTS

vendor:snommodel:voip phonescope:eqversion:8.2.3

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.1.1

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.2.2

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.2.4

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.2.1

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.0.12

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.1.2

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.0.13

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.0.11

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.1.3

Trust: 1.6

vendor:snommodel:voip phonescope:eqversion:8.2.7

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.10

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.29

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.28

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.6

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.9

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.11

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.17

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.23

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.26

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.16

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.8

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.25

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.34

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.20

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.33

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.31

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.30

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.21

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.5

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.18

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.19

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.22

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.27

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.32

Trust: 1.0

vendor:snommodel:voip phonescope:eqversion:8.2.24

Trust: 1.0

vendor:snommodel:voip phonescope:ltversion:8.2.35 8

Trust: 0.8

vendor:snommodel:technology voip phonescope:eqversion:8.2.34

Trust: 0.3

vendor:snommodel:technology voip phonescope:eqversion:8.2.33

Trust: 0.3

vendor:snommodel:technology voip phonescope:eqversion:8.2.32

Trust: 0.3

vendor:snommodel:technology voip phonescope:eqversion:8.2.31

Trust: 0.3

vendor:snommodel:technology voip phonescope:eqversion:8.2.30

Trust: 0.3

vendor:snommodel:technology voip phonescope:neversion:8.2.35

Trust: 0.3

sources: BID: 40771 // JVNDB: JVNDB-2010-005529 // CNNVD: CNNVD-201006-251 // NVD: CVE-2010-2291

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2291
value: LOW

Trust: 1.0

NVD: CVE-2010-2291
value: LOW

Trust: 0.8

CNNVD: CNNVD-201006-251
value: LOW

Trust: 0.6

VULHUB: VHN-44896
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2010-2291
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-44896
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44896 // JVNDB: JVNDB-2010-005529 // CNNVD: CNNVD-201006-251 // NVD: CVE-2010-2291

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: VULHUB: VHN-44896 // JVNDB: JVNDB-2010-005529 // NVD: CVE-2010-2291

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201006-251

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201006-251

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005529

PATCH

title:8.2.35url:http://wiki.snom.com/Firmware/V8/Release_Notes/8.2.35

Trust: 0.8

title:Wireshark 1.2.9url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=3691

Trust: 0.6

sources: JVNDB: JVNDB-2010-005529 // CNNVD: CNNVD-201006-251

EXTERNAL IDS

db:NVDid:CVE-2010-2291

Trust: 2.8

db:BIDid:40771

Trust: 2.0

db:SECUNIAid:37635

Trust: 1.8

db:OSVDBid:65383

Trust: 1.7

db:JVNDBid:JVNDB-2010-005529

Trust: 0.8

db:CNNVDid:CNNVD-201006-251

Trust: 0.7

db:XFid:59342

Trust: 0.6

db:VULHUBid:VHN-44896

Trust: 0.1

db:PACKETSTORMid:90499

Trust: 0.1

sources: VULHUB: VHN-44896 // BID: 40771 // JVNDB: JVNDB-2010-005529 // PACKETSTORM: 90499 // CNNVD: CNNVD-201006-251 // NVD: CVE-2010-2291

REFERENCES

url:http://wiki.snom.com/firmware/v8/release_notes/8.2.35

Trust: 2.1

url:http://www.securityfocus.com/bid/40771

Trust: 1.7

url:http://osvdb.org/65383

Trust: 1.7

url:http://secunia.com/advisories/37635

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/59342

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2291

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2291

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/59342

Trust: 0.6

url:http://secunia.com/advisories/37635/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=37635

Trust: 0.1

url:http://secunia.com/advisories/37635/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-44896 // BID: 40771 // JVNDB: JVNDB-2010-005529 // PACKETSTORM: 90499 // CNNVD: CNNVD-201006-251 // NVD: CVE-2010-2291

CREDITS

snom

Trust: 0.3

sources: BID: 40771

SOURCES

db:VULHUBid:VHN-44896
db:BIDid:40771
db:JVNDBid:JVNDB-2010-005529
db:PACKETSTORMid:90499
db:CNNVDid:CNNVD-201006-251
db:NVDid:CVE-2010-2291

LAST UPDATE DATE

2025-04-11T23:04:25.518000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44896date:2017-08-17T00:00:00
db:BIDid:40771date:2015-04-13T21:02:00
db:JVNDBid:JVNDB-2010-005529date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-201006-251date:2010-06-18T00:00:00
db:NVDid:CVE-2010-2291date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-44896date:2010-06-15T00:00:00
db:BIDid:40771date:2010-06-09T00:00:00
db:JVNDBid:JVNDB-2010-005529date:2012-12-20T00:00:00
db:PACKETSTORMid:90499date:2010-06-11T13:54:45
db:CNNVDid:CNNVD-201006-251date:2010-06-18T00:00:00
db:NVDid:CVE-2010-2291date:2010-06-15T14:04:26.733