Vulnerability Name: | CCN-10166 | ||||||
Published: | 2002-09-19 | ||||||
Updated: | 2002-09-19 | ||||||
Summary: | The Cisco SIP-based IP Phone model 7960 allows unauthorized access to the Trivial File Transfer Protocol (TFTP) service. Trivial File Transfer Protocol (TFTP) allows remote users to copy, transfer, or write to files without requiring authentication. The TFTP service in Cisco IP Phone model 7960 is used for updating configuration files. A remote attacker could use this vulnerability to download the default configuration file for the affected device, which could be used to gain enough information about the IP Phone in order to download the specific configuration file for the device. An attacker could use this information to launch further attacks against the affected device, including causing malicious firmware to be installed by the device. | ||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Sep 19 2002 - 06:22:32 CDT The Trivial Cisco IP Phones Compromise Source: CCN Type: BugTraq Mailing List, Thu Sep 19 2002 - 15:32:43 CDT Re: The Trivial Cisco IP Phones Compromise Source: CCN Type: BID-5756 Cisco IP Phone 7960 Firmware TFTP Authentication Weakness Source: CCN Type: BID-5758 Cisco IP Phone 7960 Unsigned Content Weakness Source: XF Type: UNKNOWN cisco-ipphone-tftp-access(10166) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |