First published: Tue Dec 15 2015(Updated: )
The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Spa500 Firmware | =7.5.7 | |
Cisco Spa 500ds | ||
Cisco Spa 500s | ||
Cisco Spa 501g | ||
Cisco Spa 502g | ||
Cisco Spa 504g | ||
Cisco Spa 508g | ||
Cisco Spa 509g | ||
Cisco Spa 512g | ||
Cisco Spa 514g | ||
Cisco Spa 525g2 | ||
Cisco Spa300 Firmware | =7.5.7 | |
Cisco Spa 301 | ||
Cisco Spa 303 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.