ID

VAR-200601-0386


TITLE

CNVD-2006-0267

Trust: 1.0

sources: IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1 // IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d // CNVD: CNVD-2006-0267

DESCRIPTION

ACT P202S VOIP WIFI is a wireless VOIP phone. MPM HP-180W VOIP WIFI phones have multiple security issues that can be exploited by remote attackers to gain access to sensitive information or administrator access. The ACT P202S VOIP WIFI phone allows remote debug connections and remote unauthorized management access. Successful exploitation of these vulnerabilities allows an attacker to obtain debug information or denial of service from the device. These include undocumented port UDP/17185 VxWorks WDB for remote debugging, undocumented port TCP/7 echo, undocumented port TCP/513 rlogin

Trust: 0.9

sources: CNVD: CNVD-2006-0267 // IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1 // IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1 // IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d // CNVD: CNVD-2006-0267

AFFECTED PRODUCTS

vendor:nomodel: - scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2006-0267

CVSS

SEVERITY

CVSSV2

CVSSV3

IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1
value: HIGH

Trust: 0.2

IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

sources: IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1 // IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d

TYPE

Buffer overflow

Trust: 0.2

sources: IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1

EXTERNAL IDS

db:CNVDid:CNVD-2006-0267

Trust: 1.0

db:CNCANid:CNCAN-2006011801

Trust: 0.6

db:IVDid:7D7E164F-463F-11E9-8CD5-000C29342CB1

Trust: 0.2

db:IVDid:0F36C8AC-201A-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 7d7e164f-463f-11e9-8cd5-000c29342cb1 // IVD: 0f36c8ac-201a-11e6-abef-000c29c66e3d // CNVD: CNVD-2006-0267

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-january/041434.html

Trust: 0.6

sources: CNVD: CNVD-2006-0267

SOURCES

db:IVDid:7d7e164f-463f-11e9-8cd5-000c29342cb1
db:IVDid:0f36c8ac-201a-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2006-0267

LAST UPDATE DATE

2022-05-17T01:42:14.456000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2006-0267date:2006-01-17T00:00:00

SOURCES RELEASE DATE

db:IVDid:7d7e164f-463f-11e9-8cd5-000c29342cb1date:2006-01-17T00:00:00
db:IVDid:0f36c8ac-201a-11e6-abef-000c29c66e3ddate:2006-01-17T00:00:00
db:CNVDid:CNVD-2006-0267date:2006-01-17T00:00:00