First published: Mon Feb 25 2019(Updated: )
A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco SPA112 2-Port Phone Adapter Firmware | =1.4.2 | |
Cisco SPA112 2-Port Phone Adapter Firmware | ||
All of | ||
Cisco SPA 525G2 Firmware | =7.6.2 | |
Cisco SPA 525g | ||
All of | ||
Cisco SPA5x5 firmware | =7.6.2 | |
Cisco SPA5x5 firmware | ||
All of | ||
Cisco SPA 500 Series IP Phone Firmware | =1.4.2 | |
Cisco SPA 500 | ||
All of | ||
Cisco SPA 500s Firmware | =1.4.2 | |
Cisco SPA 500 | ||
All of | ||
Cisco SPA 500DS Firmware | =1.4.2 | |
Cisco SPA 500 DS | ||
All of | ||
Cisco SPA 501G Firmware | =1.4.2 | |
Cisco SPA 501G Firmware | ||
All of | ||
Quectel RG502Q-EA Firmware | =1.4.2 | |
Cisco SPA 502G Firmware | ||
All of | ||
Cisco SPA504G | =1.4.2 | |
Cisco SPA 500 Series | ||
All of | ||
Cisco SPA508G Firmware | =1.4.2 | |
Cisco SPA 508G | ||
All of | ||
Cisco SPA 509g firmware | =1.4.2 | |
Cisco SPA 509G | ||
All of | ||
Cisco SPA 512G Firmware | =1.4.2 | |
Cisco SPA 512G Firmware | ||
All of | ||
Cisco SPA514G | =1.4.2 | |
Cisco SPA 514G Firmware | ||
All of | ||
Cisco SPA 525g firmware | =1.4.2 | |
Cisco SPA 525G2 Firmware | ||
Cisco SPA112 2-Port Phone Adapter Firmware | =1.4.2 | |
Cisco SPA112 2-Port Phone Adapter Firmware | ||
Cisco SPA 525G2 Firmware | =7.6.2 | |
Cisco SPA 525g | ||
Cisco SPA5x5 firmware | =7.6.2 | |
Cisco SPA5x5 firmware | ||
Cisco SPA 500 Series IP Phone Firmware | =1.4.2 | |
Cisco SPA 500 | ||
Cisco SPA 500s Firmware | =1.4.2 | |
Cisco SPA 500 | ||
Cisco SPA 500DS Firmware | =1.4.2 | |
Cisco SPA 500 DS | ||
Cisco SPA 501G Firmware | =1.4.2 | |
Cisco SPA 501G Firmware | ||
Quectel RG502Q-EA Firmware | =1.4.2 | |
Cisco SPA 502G Firmware | ||
Cisco SPA504G | =1.4.2 | |
Cisco SPA 500 Series | ||
Cisco SPA508G Firmware | =1.4.2 | |
Cisco SPA 508G | ||
Cisco SPA 509g firmware | =1.4.2 | |
Cisco SPA 509G | ||
Cisco SPA 512G Firmware | =1.4.2 | |
Cisco SPA 512G Firmware | ||
Cisco SPA514G | =1.4.2 | |
Cisco SPA 514G Firmware | ||
Cisco SPA 525g firmware | =1.4.2 | |
Cisco SPA 525G2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1683.
The severity of CVE-2019-1683 is high, with a CVSS score of 7.4.
The Cisco SPA112, SPA525, and SPA5X5 Series IP Phones are affected by CVE-2019-1683.
An unauthenticated, remote attacker can exploit CVE-2019-1683 to listen to or control certain aspects of a TLS-encrypted SIP conversation.
You can find more information about CVE-2019-1683 on the SecurityFocus and Cisco Security Advisory websites.