First published: Fri Mar 22 2019(Updated: )
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Ip Phone 8821 Firmware | <11.0\(5\) | |
Cisco Ip Phone 8821 | ||
Cisco Ip Phone 8821-ex Firmware | <11.0\(5\) | |
Cisco Ip Phone 8821-ex | ||
Cisco Ip Conference Phone 8832 Firmware | <12.5\(1\)sr1 | |
Cisco Ip Conference Phone 8832 | ||
Cisco Ip Phone 8800 Firmware | <12.5\(1\)sr1 | |
Cisco IP Phone 8800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1763 is a vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series.
CVE-2019-1763 allows an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition.
CVE-2019-1763 affects Cisco IP Phone 8800 Series with firmware up to 11.0(5) and Cisco IP Phone 8821-ex Firmware up to 11.0(5).
CVE-2019-1763 has a severity rating of 7.5 (High).
To fix CVE-2019-1763, it is recommended to upgrade to a fixed version of the software as mentioned in the Cisco Security Advisory.