First published: Tue Oct 08 2019(Updated: )
Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink VP59 Firmware | <=2019-08-04 | |
Yealink VP59 Firmware | ||
Yealink T49G Firmware | <=2019-08-04 | |
Yealink T49G | ||
Yealink T58V Firmware | <=2019-08-04 | |
Yealink T58V Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14656 is rated as a critical vulnerability due to the potential for unauthorized administrative access.
To mitigate CVE-2019-14656, update the affected Yealink firmware to a version released after August 4, 2019.
CVE-2019-14656 affects Yealink VP59, T49G, and T58V devices running firmware versions prior to 2019-08-04.
CVE-2019-14656 allows a default user account to perform admin-level actions, posing significant security risks.
A temporary workaround for CVE-2019-14656 includes disabling remote management to limit unauthorized access.