Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges.
These vulnerabilities exist because incoming HTTP packets are not properly checked for errors, which could result in a buffer overflow. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to overflow an internal buffer and execute arbitrary commands at the root privilege level.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-http-vulns-RJZmX2Xz | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
23 Aug 2024, 18:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:spa_502g_1-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_303_3_line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_525g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_301_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_501g_8-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_512g_1-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_504g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_303_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_514g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_525g_5-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_525g2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_502g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_512g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_525g2_5-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_514g_4-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_509g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_501g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_508g_8-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_504g_4-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:spa_508g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_509g_12-line_ip_phone:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:spa_301_1_line_ip_phone:-:*:*:*:*:*:*:* |
|
Summary |
|
|
First Time |
Cisco
Cisco spa 512g Firmware Cisco spa 502g Firmware Cisco spa 525g2 Firmware Cisco spa 525g 5-line Ip Phone Cisco spa 501g 8-line Ip Phone Cisco spa 501g Firmware Cisco spa 301 Firmware Cisco spa 502g 1-line Ip Phone Cisco spa 508g Firmware Cisco spa 514g 4-line Ip Phone Cisco spa 303 3 Line Ip Phone Cisco spa 508g 8-line Ip Phone Cisco spa 509g Firmware Cisco spa 509g 12-line Ip Phone Cisco spa 303 Firmware Cisco spa 514g Firmware Cisco spa 504g 4-line Ip Phone Cisco spa 525g2 5-line Ip Phone Cisco spa 512g 1-line Ip Phone Cisco spa 504g Firmware Cisco spa 301 1 Line Ip Phone Cisco spa 525g Firmware |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-http-vulns-RJZmX2Xz - Vendor Advisory |
07 Aug 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-07 17:15
Updated : 2024-08-23 18:14
NVD link : CVE-2024-20450
Mitre link : CVE-2024-20450
CVE.ORG link : CVE-2024-20450
JSON object : View
Products Affected
cisco
- spa_514g_firmware
- spa_525g2_firmware
- spa_509g_12-line_ip_phone
- spa_504g_4-line_ip_phone
- spa_508g_firmware
- spa_502g_1-line_ip_phone
- spa_514g_4-line_ip_phone
- spa_303_firmware
- spa_508g_8-line_ip_phone
- spa_525g_firmware
- spa_301_firmware
- spa_504g_firmware
- spa_502g_firmware
- spa_501g_firmware
- spa_501g_8-line_ip_phone
- spa_303_3_line_ip_phone
- spa_512g_1-line_ip_phone
- spa_525g2_5-line_ip_phone
- spa_509g_firmware
- spa_525g_5-line_ip_phone
- spa_301_1_line_ip_phone
- spa_512g_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')