CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd.
References
Link | Resource |
---|---|
https://networks.unify.com/security/advisories/OBSO-1501-02.pdf | Vendor Advisory |
https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
09 Sep 2021, 17:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:unify:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:* cpe:2.3:h:unify:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:* |
cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:* cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:* cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:* |
Information
Published : 2018-04-12 21:29
Updated : 2024-02-04 19:46
NVD link : CVE-2014-9563
Mitre link : CVE-2014-9563
CVE.ORG link : CVE-2014-9563
JSON object : View
Products Affected
unify
- openstage_40
- openstage_60
- openstage_sip
- openstage_20
- openscape_desk_phone_ip_sip
atos
- openscape_desk_phone_ip_55g
- openscape_desk_phone_ip_35g_eco
- openscape_desk_phone_ip_35g
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')