First published: Sat Mar 21 2015(Updated: )
The default configuration of Cisco Small Business IP phones SPA 300 7.5.5 and SPA 500 7.5.5 does not properly support authentication, which allows remote attackers to read audio-stream data or originate telephone calls via a crafted XML request, aka Bug ID CSCuo52482.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA 500 Series IP Phone Firmware | =7.5.5 | |
Cisco SPA 501G | ||
Cisco SPA 502G 1-Line IP Phone | ||
Cisco SPA 504G | ||
Cisco SPA500 series IP phone | ||
Cisco SPA 509g 12-line IP Phone | ||
Cisco SPA 512G 1-line IP Phone | ||
Cisco SPA514G | ||
Cisco SPA 525g 5-Line IP Phone | ||
Cisco SPA 525G2 5-Line IP Phone | ||
Cisco SPA300 Firmware | =7.5.5 | |
Cisco SPA 301 1-line IP Phone | ||
Cisco SPA 302D | ||
Cisco SPA 302d | ||
Cisco SPA300 Series IP Phone |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0670 is a high-severity vulnerability that allows remote attackers to read audio-stream data and make calls.
To fix CVE-2015-0670, update the firmware of affected Cisco Small Business IP phones to the latest version.
CVE-2015-0670 affects Cisco Small Business IP phones including SPA 300 and SPA 500 Series running firmware version 7.5.5.
While the best solution is to update firmware, disabling remote management can help mitigate the impact of CVE-2015-0670.
Yes, CVE-2015-0670 can be exploited remotely through specially crafted XML requests.