First published: Mon Nov 21 2005(Updated: )
The default configuration of the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not require authentication for sensitive configuration pages, which allows remote attackers to modify configuration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi IP5000 VOIP WIFI Phone | =1.5.0 | |
Hitachi IP5000 VOIP WIFI Phone | =1.5.4 | |
Hitachi IP5000 VOIP WIFI Phone | =1.5.6 | |
Hitachi IP5000 VOIP WIFI Phone | =1.5.5 | |
Hitachi IP5000 VOIP WIFI Phone | =1.5.10 | |
Hitachi IP5000 VOIP WIFI Phone | =1.5.8 | |
Hitachi IP5000 VOIP WIFI Phone | =1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3721 is considered a high severity vulnerability due to the lack of authentication for sensitive configuration pages.
To fix CVE-2005-3721, you should secure the HTTP server configuration to require authentication for all sensitive configuration pages.
The affected versions of the Hitachi IP5000 VOIP WIFI Phone include 1.5.0, 1.5.2, 1.5.4, 1.5.5, 1.5.6, 1.5.8, and 1.5.10.
Yes, remote attackers can exploit CVE-2005-3721 to modify the device configuration without authentication.
The impact of CVE-2005-3721 includes unauthorized changes to the device settings, potentially leading to service disruption or unauthorized access.