First published: Thu Dec 08 2022(Updated: )
A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device. This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U
Credit: Qian Chen the Codesafe Team of Legendsec at QI
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Phone Firmware | =14.2 and earlier<14.2(1) | 14.2(1) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco IP Phone firmware vulnerability is cisco-sa-ipp-oobwrite-8cMF5r7U.
The severity level of cisco-sa-ipp-oobwrite-8cMF5r7U is high with a CVSS score of 8.1.
The affected software for cisco-sa-ipp-oobwrite-8cMF5r7U is the Cisco IP Phone 7800 and 8800 Series firmware version 14.2 and earlier, up to but excluding 14.2(1).
The impact of cisco-sa-ipp-oobwrite-8cMF5r7U is that an unauthenticated adjacent attacker could cause a stack overflow on an affected device.
To remediate cisco-sa-ipp-oobwrite-8cMF5r7U, upgrade the Cisco IP Phone firmware to version 14.2(1) or later.