ID

VAR-202002-0708


CVE

CVE-2020-3111


TITLE

Cisco IP Phone Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-001687

DESCRIPTION

A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). (DoS) It may be put into a state. Cisco IP Conference Phone 7832 and Cisco IP Conference Phone 8832 are all IP phone series products

Trust: 2.16

sources: NVD: CVE-2020-3111 // JVNDB: JVNDB-2020-001687 // CNVD: CNVD-2020-14803

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-14803

AFFECTED PRODUCTS

vendor:ciscomodel:ip phone 8811 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip conference phone 7832 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 6841scope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 7841 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip conference phone 8832scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 7811scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 7861 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 8865 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:wireless ip phone 8821scope:ltversion:11.0\(5\)sr2

Trust: 1.0

vendor:ciscomodel:ip phone 6861scope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 7821scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 8865scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:unified ip conference phone 8831scope:ltversion:10.3\(1\)sr6

Trust: 1.0

vendor:ciscomodel:ip phone 8851 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 7861scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:wireless ip phone 8821-exscope:ltversion:11.0\(5\)sr2

Trust: 1.0

vendor:ciscomodel:ip phone 7811 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip conference phone 8832 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 8811scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 8861 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 6821scope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:unified ip conference phone 8831 for third-party call controlscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ip phone 6851scope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 8841 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 6871scope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 8845 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 8845scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip conference phone 7832scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 7821 with multiplatformscope:ltversion:11.3\(1\)sr1

Trust: 1.0

vendor:ciscomodel:ip phone 8841scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 8861scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 8851scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip phone 7841scope:ltversion:12.7\(1\)

Trust: 1.0

vendor:ciscomodel:ip conference phone 7832 with multiplatformscope: - version: -

Trust: 0.8

vendor:ciscomodel:ip conference phone 7832scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip conference phone 8832 with multiplatformscope: - version: -

Trust: 0.8

vendor:ciscomodel:ip conference phone 8832scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip phone 6821scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip phone 6841scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip phone 6851scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip phone 6861scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip phone 6871scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip phone 7811scope: - version: -

Trust: 0.8

vendor:ciscomodel:ip conference phonescope:eqversion:7832

Trust: 0.6

vendor:ciscomodel:ip conference phonescope:eqversion:8832

Trust: 0.6

sources: CNVD: CNVD-2020-14803 // JVNDB: JVNDB-2020-001687 // NVD: CVE-2020-3111

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3111
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3111
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-001687
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-14803
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202002-128
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-3111
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-001687
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-14803
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-3111
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3111
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-001687
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-14803 // JVNDB: JVNDB-2020-001687 // CNNVD: CNNVD-202002-128 // NVD: CVE-2020-3111 // NVD: CVE-2020-3111

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2020-001687 // NVD: CVE-2020-3111

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202002-128

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202002-128

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-001687

PATCH

title:cisco-sa-20200205-voip-phones-rce-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos

Trust: 0.8

title:Patch for Cisco IP Phone Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/206253

Trust: 0.6

title:Cisco IP Phone Cisco Discovery Protocol Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108694

Trust: 0.6

sources: CNVD: CNVD-2020-14803 // JVNDB: JVNDB-2020-001687 // CNNVD: CNNVD-202002-128

EXTERNAL IDS

db:NVDid:CVE-2020-3111

Trust: 3.1

db:PACKETSTORMid:156203

Trust: 1.7

db:JVNid:JVNVU95679983

Trust: 0.8

db:JVNDBid:JVNDB-2020-001687

Trust: 0.8

db:CNVDid:CNVD-2020-14803

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.6

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.5

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.7

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.3

Trust: 0.6

db:AUSCERTid:ESB-2020.0424.9

Trust: 0.6

db:NSFOCUSid:45784

Trust: 0.6

db:CNNVDid:CNNVD-202002-128

Trust: 0.6

sources: CNVD: CNVD-2020-14803 // JVNDB: JVNDB-2020-001687 // PACKETSTORM: 156203 // CNNVD: CNNVD-202002-128 // NVD: CVE-2020-3111

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-3111

Trust: 2.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-voip-phones-rce-dos

Trust: 1.6

url:http://packetstormsecurity.com/files/156203/cisco-discovery-protocol-cdp-remote-device-takeover.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3111

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95679983/

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-ipcameras-rce-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-iosxr-cdp-rce

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20200205-nxos-cdp-rce

Trust: 0.6

url:http://www.nsfocus.net/vulndb/45784

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.9/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ip-phone-code-execution-via-cisco-discovery-protocol-31525

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.7/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.6/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.5/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0424.3/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-3110

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3119

Trust: 0.1

sources: CNVD: CNVD-2020-14803 // JVNDB: JVNDB-2020-001687 // PACKETSTORM: 156203 // CNNVD: CNNVD-202002-128 // NVD: CVE-2020-3111

CREDITS

Yuval Sarel,Barak Hadad, Ben Seri

Trust: 0.6

sources: CNNVD: CNNVD-202002-128

SOURCES

db:CNVDid:CNVD-2020-14803
db:JVNDBid:JVNDB-2020-001687
db:PACKETSTORMid:156203
db:CNNVDid:CNNVD-202002-128
db:NVDid:CVE-2020-3111

LAST UPDATE DATE

2024-11-23T21:51:40.071000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-14803date:2020-03-02T00:00:00
db:JVNDBid:JVNDB-2020-001687date:2020-02-21T00:00:00
db:CNNVDid:CNNVD-202002-128date:2021-01-05T00:00:00
db:NVDid:CVE-2020-3111date:2024-11-21T05:30:20.897

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-14803date:2020-03-02T00:00:00
db:JVNDBid:JVNDB-2020-001687date:2020-02-21T00:00:00
db:PACKETSTORMid:156203date:2020-02-05T17:05:56
db:CNNVDid:CNNVD-202002-128date:2020-02-05T00:00:00
db:NVDid:CVE-2020-3111date:2020-02-05T18:15:10.783