First published: Wed Mar 20 2019(Updated: )
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv
Credit: David Gullasch modzero AG
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Phone 8800 key expansion module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190320-ipptv is considered high due to the potential for arbitrary file write by an authenticated attacker.
To fix cisco-sa-20190320-ipptv, ensure that your Cisco IP Phone 8800 Series software is updated to the latest version provided by Cisco.
The vulnerability cisco-sa-20190320-ipptv affects users of the Cisco IP Phone 8800 Series using the web-based management interface.
With cisco-sa-20190320-ipptv, an authenticated remote attacker can write arbitrary files to the filesystem.
The cisco-sa-20190320-ipptv vulnerability is caused by insufficient input validation in the web-based management interface.