First published: Thu Apr 12 2018(Updated: )
CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Unify Openstage Sip | <r3.32.0 | |
Unify Openstage 20 | ||
Unify Openstage 40 | ||
Unify Openstage 60 | ||
Unify Openscape Desk Phone Ip Sip | <r3.32.0 | |
Atos Openscape Desk Phone Ip 35g | ||
Atos Openscape Desk Phone Ip 35g Eco | ||
Atos Openscape Desk Phone Ip 55g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.