First published: Tue Dec 15 2015(Updated: )
The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA 500 Series IP Phone Firmware | =7.5.7 | |
Cisco SPA 500ds firmware | ||
Cisco SPA 500s firmware | ||
Cisco SPA 500 Series | ||
Cisco SPA 502g firmware | ||
Cisco SPA504G | ||
Cisco SPA 500 Series | ||
Cisco SPA 509g firmware | ||
Cisco SPA 512G 1-line IP Phone | ||
Cisco SPA 514g firmware | ||
Cisco SPA 525G2 Firmware | ||
Cisco SPA300 Firmware | =7.5.7 | |
Cisco SPA 301 | ||
Cisco SPA 303 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6403 is rated as a high severity vulnerability due to its potential for local exploitation.
To mitigate CVE-2015-6403, update the affected Cisco phones to the latest firmware version that addresses the vulnerability.
CVE-2015-6403 affects Cisco Small Business SPA30x and SPA50x series phones running firmware version 7.5.7.
CVE-2015-6403 requires local access for exploitation, making it a local privilege escalation vulnerability.
If successfully exploited, CVE-2015-6403 allows an attacker to load unauthorized firmware images onto the affected phones.