ID

VAR-201503-0173


CVE

CVE-2015-0670


TITLE

Cisco Small Business IP phone of SPA300 and SPA500 Vulnerability to read audio stream data in the default settings of the series

Trust: 0.8

sources: JVNDB: JVNDB-2015-001900

DESCRIPTION

The default configuration of Cisco Small Business IP phones SPA 300 7.5.5 and SPA 500 7.5.5 does not properly support authentication, which allows remote attackers to read audio-stream data or originate telephone calls via a crafted XML request, aka Bug ID CSCuo52482. Vendors have confirmed this vulnerability Bug ID CSCuo52482 It is released as.Skillfully crafted by a third party XML Depending on the request, the audio stream data may be read or an outgoing call may be initiated. Cisco Small Business IP phones SPA 300 and SPA 500 are Cisco 300 and SPA 500 series IP telephony products from Cisco. The program failed to set the authentication correctly. An attacker can exploit this issue to gain unauthorized access to the affected devices. This may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuo52482

Trust: 2.52

sources: NVD: CVE-2015-0670 // JVNDB: JVNDB-2015-001900 // CNVD: CNVD-2015-01923 // BID: 73248 // VULHUB: VHN-78616

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-01923

AFFECTED PRODUCTS

vendor:ciscomodel:spa500scope:eqversion:7.5.5

Trust: 1.6

vendor:ciscomodel:spa300scope:eqversion:7.5.5

Trust: 1.6

vendor:ciscomodel:spa 302dkitscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 525g 5-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 303 3 line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 508g 8-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 512g 1-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 302dscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 301 1 line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 509g 12-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 525g2 5-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 501g 8-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 504g 4-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 502g 1-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 514g 4-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:small business spa300 series ip phonescope:eqversion:7.5.5

Trust: 0.8

vendor:ciscomodel:small business spa500 series ip phonescope:eqversion:7.5.5

Trust: 0.8

vendor:ciscomodel:spa 301 1-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 302d multi-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 302dkit ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 303 3-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 501g 8-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 502g 1-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 504g 4-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 508g 8-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 509g 12-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 512g 1-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 514g 4-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 525g 5-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 525g2 5-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:small business ip phones spascope:eqversion:3007.5.5

Trust: 0.6

vendor:ciscomodel:small business ip phones spascope:eqversion:5007.5.5

Trust: 0.6

vendor:ciscomodel:small business spa500 series ip phonesscope:eqversion:7.5.5

Trust: 0.3

sources: CNVD: CNVD-2015-01923 // BID: 73248 // JVNDB: JVNDB-2015-001900 // CNNVD: CNNVD-201503-416 // NVD: CVE-2015-0670

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0670
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0670
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-01923
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201503-416
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78616
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0670
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01923
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78616
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-01923 // VULHUB: VHN-78616 // JVNDB: JVNDB-2015-001900 // CNNVD: CNNVD-201503-416 // NVD: CVE-2015-0670

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-78616 // JVNDB: JVNDB-2015-001900 // NVD: CVE-2015-0670

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-416

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201503-416

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001900

PATCH

title:37946url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37946

Trust: 0.8

sources: JVNDB: JVNDB-2015-001900

EXTERNAL IDS

db:NVDid:CVE-2015-0670

Trust: 3.4

db:SECTRACKid:1031969

Trust: 1.1

db:BIDid:73248

Trust: 1.0

db:JVNDBid:JVNDB-2015-001900

Trust: 0.8

db:CNNVDid:CNNVD-201503-416

Trust: 0.7

db:CNVDid:CNVD-2015-01923

Trust: 0.6

db:VULHUBid:VHN-78616

Trust: 0.1

sources: CNVD: CNVD-2015-01923 // VULHUB: VHN-78616 // BID: 73248 // JVNDB: JVNDB-2015-001900 // CNNVD: CNNVD-201503-416 // NVD: CVE-2015-0670

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37946

Trust: 2.6

url:http://www.securitytracker.com/id/1031969

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0670

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0670

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-01923 // VULHUB: VHN-78616 // BID: 73248 // JVNDB: JVNDB-2015-001900 // CNNVD: CNNVD-201503-416 // NVD: CVE-2015-0670

CREDITS

Cisco

Trust: 0.3

sources: BID: 73248

SOURCES

db:CNVDid:CNVD-2015-01923
db:VULHUBid:VHN-78616
db:BIDid:73248
db:JVNDBid:JVNDB-2015-001900
db:CNNVDid:CNNVD-201503-416
db:NVDid:CVE-2015-0670

LAST UPDATE DATE

2024-11-23T22:31:10.163000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01923date:2015-03-24T00:00:00
db:VULHUBid:VHN-78616date:2015-10-22T00:00:00
db:BIDid:73248date:2015-03-19T00:00:00
db:JVNDBid:JVNDB-2015-001900date:2015-03-24T00:00:00
db:CNNVDid:CNNVD-201503-416date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0670date:2024-11-21T02:23:30.467

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-01923date:2015-03-24T00:00:00
db:VULHUBid:VHN-78616date:2015-03-21T00:00:00
db:BIDid:73248date:2015-03-19T00:00:00
db:JVNDBid:JVNDB-2015-001900date:2015-03-24T00:00:00
db:CNNVDid:CNNVD-201503-416date:2015-03-23T00:00:00
db:NVDid:CVE-2015-0670date:2015-03-21T01:59:01.560