7.4
CWE
295
Advisory Published
Updated

CVE-2019-1683: Cisco SPA112, SPA525, and SPA5x5 Series IP Phones Certificate Validation Vulnerability

First published: Mon Feb 25 2019(Updated: )

A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.

Credit: ykramarz@cisco.com ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Spa112 Firmware=1.4.2
Cisco SPA112
Cisco Spa525 Firmware=7.6.2
Cisco Spa525
Cisco Spa5x5 Firmware=7.6.2
Cisco Spa5x5
Cisco Spa500 Firmware=1.4.2
Cisco Spa500
Cisco Spa500s Firmware=1.4.2
Cisco Spa500s
Cisco Spa500ds Firmware=1.4.2
Cisco Spa500ds
Cisco Spa501g Firmware=1.4.2
Cisco Spa501g
Cisco Spa502g Firmware=1.4.2
Cisco Spa502g
Cisco Spa504g Firmware=1.4.2
Cisco Spa504g
Cisco Spa508g Firmware=1.4.2
Cisco Spa508g
Cisco Spa509g Firmware=1.4.2
Cisco Spa509g
Cisco Spa512g Firmware=1.4.2
Cisco Spa512g
Cisco Spa514g Firmware=1.4.2
Cisco Spa514g
Cisco Spa525g Firmware=1.4.2
Cisco Spa525g
All of
Cisco Spa112 Firmware=1.4.2
Cisco SPA112
All of
Cisco Spa525 Firmware=7.6.2
Cisco Spa525
All of
Cisco Spa5x5 Firmware=7.6.2
Cisco Spa5x5
All of
Cisco Spa500 Firmware=1.4.2
Cisco Spa500
All of
Cisco Spa500s Firmware=1.4.2
Cisco Spa500s
All of
Cisco Spa500ds Firmware=1.4.2
Cisco Spa500ds
All of
Cisco Spa501g Firmware=1.4.2
Cisco Spa501g
All of
Cisco Spa502g Firmware=1.4.2
Cisco Spa502g
All of
Cisco Spa504g Firmware=1.4.2
Cisco Spa504g
All of
Cisco Spa508g Firmware=1.4.2
Cisco Spa508g
All of
Cisco Spa509g Firmware=1.4.2
Cisco Spa509g
All of
Cisco Spa512g Firmware=1.4.2
Cisco Spa512g
All of
Cisco Spa514g Firmware=1.4.2
Cisco Spa514g
All of
Cisco Spa525g Firmware=1.4.2
Cisco Spa525g

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2019-1683.

  • What is the severity of CVE-2019-1683?

    The severity of CVE-2019-1683 is high, with a CVSS score of 7.4.

  • Which software is affected by CVE-2019-1683?

    The Cisco SPA112, SPA525, and SPA5X5 Series IP Phones are affected by CVE-2019-1683.

  • How can an attacker exploit CVE-2019-1683?

    An unauthenticated, remote attacker can exploit CVE-2019-1683 to listen to or control certain aspects of a TLS-encrypted SIP conversation.

  • Where can I find more information about CVE-2019-1683?

    You can find more information about CVE-2019-1683 on the SecurityFocus and Cisco Security Advisory websites.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203