Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 2.0.1 leaks sensitive information during boot-up, which allows attackers to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/288383 - | |
References | () http://www.iss.net/security_center/static/9948.php - | |
References | () http://www.securityfocus.com/bid/5534 - | |
References | () http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt - Vendor Advisory, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt - Vendor Advisory, URL Repurposed |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:42
NVD link : CVE-2002-1934
Mitre link : CVE-2002-1934
CVE.ORG link : CVE-2002-1934
JSON object : View
Products Affected
pingtel
- xpressa
CWE