CVE-2014-8421

Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allow remote attackers to gain super-user privileges by leveraging SSH access and incorrect ownership of (1) ConfigureCoreFile.sh, (2) Traceroute.sh, (3) apps.sh, (4) conversion_java2native.sh, (5) coreCompression.sh, (6) deletePasswd.sh, (7) findHealthSvcFDs.sh, (8) fw_printenv.sh, (9) fw_setenv.sh, (10) hw_wd_kicker.sh, (11) new_rootfs.sh, (12) opera_killSnmpd.sh, (13) opera_startSnmpd.sh, (14) rebootOperaSoftware.sh, (15) removeLogFiles.sh, (16) runOperaServices.sh, (17) setPasswd.sh, (18) startAccTestSvcs.sh, (19) usbNotification.sh, or (20) appWeb in /Opera_Deploy.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:unify:openstage_sip:*:*:*:*:*:*:*:*
OR cpe:2.3:h:unify:openstage_20:-:*:*:*:*:*:*:*
cpe:2.3:h:unify:openstage_40:-:*:*:*:*:*:*:*
cpe:2.3:h:unify:openstage_60:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:unify:openscape_desk_phone_ip_sip:*:*:*:*:*:*:*:*
OR cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*
cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*

History

09 Sep 2021, 17:47

Type Values Removed Values Added
CPE cpe:2.3:h:unify:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*
cpe:2.3:h:unify:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*
cpe:2.3:h:unify:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*
cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*

Information

Published : 2018-04-12 21:29

Updated : 2024-02-04 19:46


NVD link : CVE-2014-8421

Mitre link : CVE-2014-8421

CVE.ORG link : CVE-2014-8421


JSON object : View

Products Affected

unify

  • openstage_40
  • openstage_60
  • openstage_sip
  • openstage_20
  • openscape_desk_phone_ip_sip

atos

  • openscape_desk_phone_ip_55g
  • openscape_desk_phone_ip_35g_eco
  • openscape_desk_phone_ip_35g
CWE
CWE-264

Permissions, Privileges, and Access Controls