ID

VAR-200702-0464


CVE

CVE-2007-1063


TITLE

SSH server in Cisco Unified IP Phone Device access vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-001598

DESCRIPTION

The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device. Cisco Unified IP Conference Station and Unified IP Phone are prone to multiple remote vulnerabilities. These issues include an administrative-bypass issue, an unauthorized-access issue, and a privilege-escalation issue. An attacker can exploit these issues to completely compromise affected devices. The attacker may be able to gain administrative access to the affected device, execute arbitrary code with administrative privileges, or cause the device to become unstable, denying service to legitimate users. The SSH server in many Cisco products has a trust management vulnerability. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. 1) A design error in way the administrative HTTP interface of Cisco Unified IP Conference Station handles the state of administrator login sessions can be exploited to bypass the user authentication by accessing management URLs directly. This can further be exploited to cause a DoS (Denial of Service) or gain escalated privileges. SOLUTION: Update to a fixed version (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Christian Reichert, Christian Blum, and Jens Link of Intact Integrated Services. 2) Reported by the vendor. ORIGINAL ADVISORY: Cisco Systems: http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-1063 // JVNDB: JVNDB-2007-001598 // BID: 22647 // VULHUB: VHN-24425 // PACKETSTORM: 54564

AFFECTED PRODUCTS

vendor:ciscomodel:unified ip phone 7961gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7911gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7906gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7970gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7971gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7941gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7911gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7941gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7961gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7970gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7906gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7971gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip conference station 7936scope:eqversion:3.2\(15\)

Trust: 0.6

vendor:ciscomodel:unified ip conference station 7935scope:eqversion:3.2\(15\)

Trust: 0.6

vendor:ciscomodel:skinny client control protocol softwarescope:eqversion:8.0\(4\)

Trust: 0.6

vendor:ciscomodel:skinny client control protocol softwarescope:eqversion:3.2\(15\)

Trust: 0.6

vendor:ciscomodel:unified ip phone 8.0 sr1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phone 7970gscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phone 7961gscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phone 7941gscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phone 7911gscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phone 7906gscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip conference stationscope:eqversion:7936

Trust: 0.3

vendor:ciscomodel:unified ip conference stationscope:eqversion:7935

Trust: 0.3

vendor:ciscomodel:unified ip conference stationscope:eqversion:3.3(12)

Trust: 0.3

vendor:ciscomodel:unified ip conference stationscope:eqversion:3.2(15)

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:neversion:8.2(1)

Trust: 0.3

vendor:ciscomodel:unified ip phone 8.0 sr2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:unified ip conference stationscope:neversion:3.3(13)

Trust: 0.3

vendor:ciscomodel:unified ip conference stationscope:neversion:3.2(16)

Trust: 0.3

sources: BID: 22647 // JVNDB: JVNDB-2007-001598 // CNNVD: CNNVD-200702-358 // NVD: CVE-2007-1063

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1063
value: HIGH

Trust: 1.0

NVD: CVE-2007-1063
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-358
value: CRITICAL

Trust: 0.6

VULHUB: VHN-24425
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-1063
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24425
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24425 // JVNDB: JVNDB-2007-001598 // CNNVD: CNNVD-200702-358 // NVD: CVE-2007-1063

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.1

sources: VULHUB: VHN-24425 // NVD: CVE-2007-1063

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200702-358

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-200702-358

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001598

PATCH

title:cisco-sa-20070221-phoneurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070221-phone

Trust: 0.8

sources: JVNDB: JVNDB-2007-001598

EXTERNAL IDS

db:NVDid:CVE-2007-1063

Trust: 2.8

db:BIDid:22647

Trust: 2.0

db:SECUNIAid:24262

Trust: 1.8

db:SECTRACKid:1017681

Trust: 1.7

db:VUPENid:ADV-2007-0689

Trust: 1.7

db:OSVDBid:45246

Trust: 1.7

db:JVNDBid:JVNDB-2007-001598

Trust: 0.8

db:CNNVDid:CNNVD-200702-358

Trust: 0.7

db:VULHUBid:VHN-24425

Trust: 0.1

db:PACKETSTORMid:54564

Trust: 0.1

sources: VULHUB: VHN-24425 // BID: 22647 // JVNDB: JVNDB-2007-001598 // PACKETSTORM: 54564 // CNNVD: CNNVD-200702-358 // NVD: CVE-2007-1063

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml

Trust: 2.1

url:http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml

Trust: 1.8

url:http://www.securityfocus.com/bid/22647

Trust: 1.7

url:http://osvdb.org/45246

Trust: 1.7

url:http://www.securitytracker.com/id?1017681

Trust: 1.7

url:http://secunia.com/advisories/24262

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/0689

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32627

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1063

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1063

Trust: 0.8

url:http://www.cisco.com/en/us/products/hw/phones/ps379/ps5476/index.html

Trust: 0.3

url:http://www.cisco.com/en/us/products/hw/phones/ps379/index.html

Trust: 0.3

url:/archive/1/460752

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13540/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/24262/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13541/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/13543/

Trust: 0.1

sources: VULHUB: VHN-24425 // BID: 22647 // JVNDB: JVNDB-2007-001598 // PACKETSTORM: 54564 // CNNVD: CNNVD-200702-358 // NVD: CVE-2007-1063

CREDITS

Christian Reichert Christian Blum Jens Link,Christian Reichert Christian Blum Jens Link

Trust: 0.6

sources: CNNVD: CNNVD-200702-358

SOURCES

db:VULHUBid:VHN-24425
db:BIDid:22647
db:JVNDBid:JVNDB-2007-001598
db:PACKETSTORMid:54564
db:CNNVDid:CNNVD-200702-358
db:NVDid:CVE-2007-1063

LAST UPDATE DATE

2024-11-23T22:28:22.054000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24425date:2019-05-23T00:00:00
db:BIDid:22647date:2016-07-06T14:40:00
db:JVNDBid:JVNDB-2007-001598date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200702-358date:2019-05-27T00:00:00
db:NVDid:CVE-2007-1063date:2024-11-21T00:27:25.117

SOURCES RELEASE DATE

db:VULHUBid:VHN-24425date:2007-02-22T00:00:00
db:BIDid:22647date:2007-02-21T00:00:00
db:JVNDBid:JVNDB-2007-001598date:2012-06-26T00:00:00
db:PACKETSTORMid:54564date:2007-02-23T02:32:16
db:CNNVDid:CNNVD-200702-358date:2007-02-21T00:00:00
db:NVDid:CVE-2007-1063date:2007-02-22T01:28:00