8.8
CWE
77 20
Advisory Published

cisco-sa-20180711-phone-webui-inject: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Web UI Command Injection Vulnerability

First published: Wed Jul 11 2018(Updated: )

A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including arbitrary shell commands in a specific user input field. Cisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180711-phone-webui-inject

Affected SoftwareAffected VersionHow to fix
Cisco IP Phone 6800
Cisco IP Phone 7800 Series Firmware
Cisco IP Phone 8800 key expansion module

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-20180711-phone-webui-inject?

    The severity of the cisco-sa-20180711-phone-webui-inject vulnerability is high due to the potential for command injection by an authenticated attacker.

  • How do I fix cisco-sa-20180711-phone-webui-inject?

    To mitigate cisco-sa-20180711-phone-webui-inject, update the affected Cisco IP Phone firmware to the latest recommended version.

  • Who is affected by cisco-sa-20180711-phone-webui-inject?

    The cisco-sa-20180711-phone-webui-inject vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series devices with Multiplatform Firmware.

  • What are the potential consequences of cisco-sa-20180711-phone-webui-inject?

    If exploited, cisco-sa-20180711-phone-webui-inject may allow an attacker to execute arbitrary commands on the web server with elevated privileges.

  • Is authentication required to exploit cisco-sa-20180711-phone-webui-inject?

    Yes, an attacker must be authenticated to exploit the cisco-sa-20180711-phone-webui-inject vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203