First published: Wed Feb 20 2019(Updated: )
A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-ipphone-certs
Credit: Jan Dubový.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA112 2-Port Phone Adapter Firmware | ||
Cisco SPA 525g | ||
Cisco SPA5x5 Series IP Phones |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-20190220-ipphone-certs has been classified as high severity.
To fix cisco-sa-20190220-ipphone-certs, update the firmware on affected Cisco IP Phones to the latest version.
cisco-sa-20190220-ipphone-certs affects the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones.
Yes, cisco-sa-20190220-ipphone-certs can be exploited by an unauthenticated, remote attacker.
The impact of cisco-sa-20190220-ipphone-certs includes the potential for attackers to listen to or control aspects of TLS-encrypted SIP sessions.