First published: Wed Jul 11 2018(Updated: )
A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Phone 6800 Series | ||
Cisco IP Phone 7800 Series Firmware | ||
Cisco IP Phone 8800 Series Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-20180711-phone-webui-inject vulnerability is high due to the potential for command injection by an authenticated attacker.
To mitigate cisco-sa-20180711-phone-webui-inject, update the affected Cisco IP Phone firmware to the latest recommended version.
The cisco-sa-20180711-phone-webui-inject vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series devices with Multiplatform Firmware.
If exploited, cisco-sa-20180711-phone-webui-inject may allow an attacker to execute arbitrary commands on the web server with elevated privileges.
Yes, an attacker must be authenticated to exploit the cisco-sa-20180711-phone-webui-inject vulnerability.