First published: Thu Feb 22 2007(Updated: )
The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified IP Phone 7906G Firmware | =8.0\(4\)-sr1 | |
Cisco Unified IP Phone 7906G Firmware | ||
Cisco Unified IP Phone 7911G Firmware | =8.0\(4\)-sr1 | |
Cisco Unified IP Phone firmware 7911G | ||
Cisco Unified IP Phone 7941G Firmware | =8.0\(4\)-sr1 | |
Cisco Unified IP Phone 7941G Firmware | ||
Cisco Unified IP Phone 7961G Firmware | =8.0\(4\)-sr1 | |
Cisco Unified IP Phone firmware 7961G | ||
Cisco Unified IP Phone firmware 7970G | =8.0\(4\)-sr1 | |
Cisco Unified IP Phones | ||
Cisco Unified IP Phone firmware | =8.0\(4\)-sr1 | |
Cisco Unified IP Phone firmware 7971G |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1063 is classified as a high severity vulnerability due to the use of hard-coded credentials in Cisco Unified IP Phones.
To mitigate CVE-2007-1063, upgrade the firmware of your affected Cisco Unified IP Phones to a version later than 8.0(4)SR1.
CVE-2007-1063 affects Cisco Unified IP Phones 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G with firmware 8.0(4)SR1 and earlier.
The vulnerability can allow remote attackers to gain unauthorized access to sensitive information and control the affected devices.
The recommended workaround is to upgrade to a secure firmware version, as there are no effective configuration workarounds available for CVE-2007-1063.