First published: Wed Nov 06 2024(Updated: )
A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device.This vulnerability is due to improper storage of sensitive information within the web UI of Session Initiation Protocol (SIP)-based phone loads. An attacker could exploit this vulnerability by browsing to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information, including incoming and outgoing call records.Note: Web Access is disabled by default.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-infodisc-sbyqQVbG
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Desk Phone 9800 Series | ||
Cisco IP Phone 7800 Series Firmware | ||
Cisco IP Phone 8800 Series Software | ||
Cisco Video Phone 8875 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-phone-infodisc-sbyqQVbG is considered high due to the potential for unauthorized access to sensitive information.
To fix cisco-sa-phone-infodisc-sbyqQVbG, it is recommended to update to the latest firmware provided by Cisco for the affected devices.
The affected devices include Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 Series, Cisco IP Phone 8800 Series, and Cisco Video Phone 8875.
Yes, cisco-sa-phone-infodisc-sbyqQVbG can be exploited by an unauthenticated remote attacker, making it a serious security concern.
cisco-sa-phone-infodisc-sbyqQVbG potentially allows attackers to access sensitive information stored on the affected devices.