First published: Wed Jul 09 2014(Updated: )
The debug console interface on Cisco Small Business SPA300 and SPA500 phones does not properly perform authentication, which allows local users to execute arbitrary debug-shell commands, or read or modify data in memory or a filesystem, via direct access to this interface, aka Bug ID CSCun77435.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA 301 1-line IP Phone | ||
Cisco SPA300 Series IP Phone | ||
Cisco SPA 501G | ||
Cisco SPA 502G 1-Line IP Phone | ||
Cisco SPA 504G | ||
Cisco SPA500 series IP phone | ||
Cisco SPA 509g 12-line IP Phone | ||
Cisco SPA 512G 1-line IP Phone | ||
Cisco SPA514G | ||
Cisco SPA 525g 5-Line IP Phone | ||
Cisco SPA 525G2 5-Line IP Phone | ||
Cisco SPA 901 1-Line IP Phone | ||
Cisco SPA 922 1-Line IP Phone with 1-Port Ethernet | ||
Cisco SPA941 4-Line IP Phone | ||
Cisco SPA942 4-Line IP Phone | ||
Cisco SPA 962 IP Phone |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3312 is rated as high due to potential unauthorized access and command execution.
To fix CVE-2014-3312, ensure that the firmware of affected Cisco Small Business phones is updated to the latest version released by Cisco.
CVE-2014-3312 affects several Cisco Small Business SPA series phones, including SPA301, SPA303, SPA501G, SPA502G, and others.
The risks associated with CVE-2014-3312 include local users executing arbitrary debug-shell commands and the ability to read or modify sensitive data.
CVE-2014-3312 requires local access to the device to exploit, making remote exploitation unlikely.