First published: Wed Sep 23 2020(Updated: )
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by accessing the physical interface of a device and inserting a USB storage device. A successful exploit could allow the attacker to execute scripts on the device in an elevated security context.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA 500 Series IP Phone Firmware | <=7.5.7\(5\) | |
Cisco SPA 500 DS | ||
Cisco SPA 500 | ||
Cisco SPA 501G Firmware | ||
Cisco SPA 502G Firmware | ||
Cisco SPA 500 Series | ||
Cisco SPA 512G Firmware | ||
Cisco SPA 514G Firmware | ||
Cisco SPA 525G2 Firmware | ||
Cisco SPA 525g2 5-line IP Phone |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Small Business SPA500 Series IP Phones vulnerability is CVE-2019-15959.
The severity level of CVE-2019-15959 is medium with a CVSS score of 6.6.
A physically proximate attacker can exploit this vulnerability by executing arbitrary commands on the device.
Cisco Small Business SPA500 Series IP Phones firmware versions up to and inclusive of 7.5.7(5) are affected.
More information about this vulnerability can be found at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-spa500-script