Search criteria
24 vulnerabilities found for skinny_client_control_protocol_software by cisco
FKIE_CVE-2018-15434
Vulnerability from fkie_nvd - Published: 2018-10-05 14:29 - Updated: 2024-11-21 03:50
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securitytracker.com/id/1041791 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041791 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "289198C0-853A-46A4-B753-CB3944511364",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7906g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7961B727-26C5-417D-AF65-2A4344277FEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7911g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "772EB250-0863-4857-A387-7F7BE7D40656",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7912g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "099A36DF-5E83-431A-AF6C-53F03A14B358",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7920_multi-charger:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550A069C-AA6F-4D85-BDAE-120E5DA6FC7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7921g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E204F37-D7CF-4138-86F4-63569C1E4012",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7925g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19B26761-635E-46A4-8807-4EC956B9F295",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7925g-ex:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7582269D-6927-422D-89D2-BF7574201FA1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7926g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4A1750-1760-4EFA-80D3-47EC39AFE3BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7931g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89E6E8D9-7D63-4656-BF5D-FFC81B291B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7940g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5BDE33-C449-4880-9E28-304E1BC0A6A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7941g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D445B497-7B54-417A-B971-05BB4CCF765F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7942g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4174556C-D859-422C-A1F3-C371D129BCB1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7945g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C670F730-4430-4831-953E-04CA7B1BE30E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7960g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43B997BF-50AE-4905-82ED-8DDAE3E6F824",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7961g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B388C5-2A4E-474D-8549-B5BEEA15E5BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7962g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62CCC080-4BF0-4838-9FC9-41C6C32F0686",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7965g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C58ED58-F044-4A9D-BBD6-BFA57473F3C4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_7975g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77BB66F1-CAE4-4098-B486-79D9423E4FF2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_conference_station_7936:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AA88C7-F162-4686-80A9-B954996B15FA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_conference_station_7937g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC0AAD19-9F30-4970-9933-843A15F2246E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_expansion_module_7915:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0EA852D-4582-4A7D-ACE2-4E5210F2DDEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phones_expansion_module_7916:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CA87F0-183A-4B19-A83C-E9B4278DF22B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de gesti\u00f3n web de Cisco Unified IP Phone 7900 Series podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque Cross-Site Scripting (XSS) contra un usuario de dicha interfaz en un dispositivo afectado. La vulnerabilidad se debe a la validaci\u00f3n insuficiente de entradas de parte del usuario en la interfaz de gesti\u00f3n web. Un atacante podr\u00eda explotar esta vulnerabilidad haciendo que un usuario de la interfaz haga clic en un enlace malicioso. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto de la interfaz afectada o que pueda acceder a informaci\u00f3n sensible del navegador."
}
],
"id": "CVE-2018-15434",
"lastModified": "2024-11-21T03:50:47.400",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-10-05T14:29:12.233",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041791"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-5445
Vulnerability from fkie_nvd - Published: 2012-12-28 11:48 - Updated: 2025-04-11 00:51
Severity ?
Summary
The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF064230-C02E-4F62-97BE-CD9882DBD479",
"versionEndIncluding": "9.2\\(4\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "039B99A7-FB9E-4967-AC20-0F1A1E518F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2C4AB40D-589E-42F6-B296-81D7B565A8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.1\\(1\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "F5D7BB9A-58EB-4B11-ACF2-08AF8EE62CA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.1\\(1\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "E83556CA-1759-4343-853D-3AFE997D1066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA376752-8664-404F-84F6-3423EDCAADDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A0848A60-767A-4F35-BED3-6A3F3580C994",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*",
"matchCriteriaId": "53A9A468-CAC3-4DC6-B839-557DBE8246D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*",
"matchCriteriaId": "26830222-1503-4748-A104-334265D8F06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*",
"matchCriteriaId": "19712324-A41D-49F1-AA74-3B30A731FF47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*",
"matchCriteriaId": "43F9E1FE-4BD5-40B9-B239-B2185821A551",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*",
"matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*",
"matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE61DF2-3D61-400F-BA70-B506412C9C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*",
"matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B76F56-31D4-4576-AC95-00AED498F25A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*",
"matchCriteriaId": "2747DB12-83B9-40E4-9671-382E241C98EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*",
"matchCriteriaId": "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7911g:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6424DE-B6C1-4270-B564-E189A0C88A53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7941g:*:*:*:*:*:*:*",
"matchCriteriaId": "5A26A7F1-BB88-4B98-9A4A-DE6EC15F9602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7961g:*:*:*:*:*:*:*",
"matchCriteriaId": "7809EBA7-36DC-45B6-9CAD-15C24753F6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7970g:*:*:*:*:*:*:*",
"matchCriteriaId": "A3873130-9724-4799-8EF1-F963FEB725FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:7971g:*:*:*:*:*:*:*",
"matchCriteriaId": "7047951B-CA4D-4F2E-98C5-4CE5E7BD4FF9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
},
{
"lang": "es",
"value": "El kernel en Cisco Native Unix (CNU) en los dispositivos Cisco Unified IP Phone 7900 series (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con software antes de v9.3.1-ES10 no valida correctamente algunas llamadas no especificados sistema, lo que permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (sobrescritura de memoria) a trav\u00e9s de un binario dise\u00f1ado para tal fin.\r\n"
}
],
"id": "CVE-2012-5445",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-12-28T11:48:44.673",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
},
{
"source": "psirt@cisco.com",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-1603
Vulnerability from fkie_nvd - Published: 2011-06-02 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
"matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
"versionEndIncluding": "9.1\\(1\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
},
{
"lang": "es",
"value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 permiten a usuarios locales conseguir privilegios a trav\u00e9s de vectores no especificados. Error tambi\u00e9n conocido Bug ID CSCtn65815."
}
],
"id": "CVE-2011-1603",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 2.7,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-06-02T20:55:03.403",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/72718"
},
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/48079"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/72718"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48079"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025588"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-1637
Vulnerability from fkie_nvd - Published: 2011-06-02 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
"matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
"versionEndIncluding": "9.1\\(1\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
},
{
"lang": "es",
"value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocido como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 no verifican adecuadamente las firmas de im\u00e1genes de software, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de una imagen hecha a mano. Error tambi\u00e9n conocido como Bug ID CSCtn65962."
}
],
"id": "CVE-2011-1637",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 2.7,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-06-02T20:55:03.480",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/72719"
},
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/72719"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-1602
Vulnerability from fkie_nvd - Published: 2011-06-02 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr2:*:*:*:*:*:*",
"matchCriteriaId": "A9856E40-A873-4012-841C-F2D568FF93A0",
"versionEndIncluding": "9.0\\(2\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
},
{
"lang": "es",
"value": "La utilidad \u0027su\u0027 en los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocidos como tel\u00e9fonos TNP) con el software anterior a la v9.0.3 permite a usuarios locales conseguir privilegios a trav\u00e9s de vectores no especificados. Error tambi\u00e9n conocido Bug ID CSCtf07426."
}
],
"id": "CVE-2011-1602",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 2.7,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-06-02T20:55:03.373",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/72717"
},
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/48074"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/72717"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48074"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025588"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-0881
Vulnerability from fkie_nvd - Published: 2002-10-04 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | voip_phone_cp-7940 | 3.0 | |
| cisco | voip_phone_cp-7940 | 3.1 | |
| cisco | voip_phone_cp-7940 | 3.2 | |
| cisco | skinny_client_control_protocol_software | 3.0 | |
| cisco | skinny_client_control_protocol_software | 3.1 | |
| cisco | skinny_client_control_protocol_software | 3.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C349C1AC-7186-404B-85DA-9B743F7550F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "43FC552E-B05B-4DD0-9125-3FC9F348745D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A58EFB-252D-46C6-80AD-0E40E0235858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
}
],
"id": "CVE-2002-0881",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-10-04T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4799"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4799"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-0882
Vulnerability from fkie_nvd - Published: 2002-10-04 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | voip_phone_cp-7940 | 3.0 | |
| cisco | voip_phone_cp-7940 | 3.1 | |
| cisco | voip_phone_cp-7940 | 3.2 | |
| cisco | skinny_client_control_protocol_software | 3.0 | |
| cisco | skinny_client_control_protocol_software | 3.1 | |
| cisco | skinny_client_control_protocol_software | 3.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C349C1AC-7186-404B-85DA-9B743F7550F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "43FC552E-B05B-4DD0-9125-3FC9F348745D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A58EFB-252D-46C6-80AD-0E40E0235858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
}
],
"id": "CVE-2002-0882",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-10-04T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.iss.net/security_center/static/9143.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4794"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/4798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/security_center/static/9143.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/4798"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-0880
Vulnerability from fkie_nvd - Published: 2002-10-04 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | voip_phone_cp-7940 | 3.0 | |
| cisco | voip_phone_cp-7940 | 3.1 | |
| cisco | voip_phone_cp-7940 | 3.2 | |
| cisco | skinny_client_control_protocol_software | 3.0 | |
| cisco | skinny_client_control_protocol_software | 3.1 | |
| cisco | skinny_client_control_protocol_software | 3.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C349C1AC-7186-404B-85DA-9B743F7550F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "43FC552E-B05B-4DD0-9125-3FC9F348745D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:voip_phone_cp-7940:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A58EFB-252D-46C6-80AD-0E40E0235858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
}
],
"id": "CVE-2002-0880",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-10-04T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-15434 (GCVE-0-2018-15434)
Vulnerability from cvelistv5 – Published: 2018-10-05 14:00 – Updated: 2024-11-26 14:26
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Unified IP Phone 7900 Series |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:54:03.598Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"name": "1041791",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041791"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-15434",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-25T18:47:43.085252Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-26T14:26:44.161Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Unified IP Phone 7900 Series",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-10-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-07T09:57:02",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"name": "1041791",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041791"
}
],
"source": {
"advisory": "cisco-sa-20181003-uipp-7900-xss",
"defect": [
[
"CSCvj73657"
]
],
"discovery": "UNKNOWN"
},
"title": "Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2018-10-03T16:00:00-0500",
"ID": "CVE-2018-15434",
"STATE": "PUBLIC",
"TITLE": "Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Unified IP Phone 7900 Series",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.1",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"name": "1041791",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041791"
}
]
},
"source": {
"advisory": "cisco-sa-20181003-uipp-7900-xss",
"defect": [
[
"CSCvj73657"
]
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-15434",
"datePublished": "2018-10-05T14:00:00Z",
"dateReserved": "2018-08-17T00:00:00",
"dateUpdated": "2024-11-26T14:26:44.161Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5445 (GCVE-0-2012-5445)
Vulnerability from cvelistv5 – Published: 2012-12-28 11:00 – Updated: 2024-08-06 21:05
VLAI?
Summary
The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:05:47.223Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-07T10:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-5445",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"name": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html",
"refsource": "MISC",
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-5445",
"datePublished": "2012-12-28T11:00:00",
"dateReserved": "2012-10-17T00:00:00",
"dateUpdated": "2024-08-06T21:05:47.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1602 (GCVE-0-2011-1602)
Vulnerability from cvelistv5 – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:28:42.032Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "48074",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48074"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72717",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72717"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-07T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "48074",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48074"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72717",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72717"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1602",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "48074",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48074"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72717",
"refsource": "OSVDB",
"url": "http://osvdb.org/72717"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1602",
"datePublished": "2011-06-02T20:00:00",
"dateReserved": "2011-04-05T00:00:00",
"dateUpdated": "2024-08-06T22:28:42.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1637 (GCVE-0-2011-1637)
Vulnerability from cvelistv5 – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:37:24.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"refsource": "OSVDB",
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1637",
"datePublished": "2011-06-02T20:00:00",
"dateReserved": "2011-04-05T00:00:00",
"dateUpdated": "2024-08-06T22:37:24.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1603 (GCVE-0-2011-1603)
Vulnerability from cvelistv5 – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:28:41.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48079",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48079"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72718",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72718"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-07T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48079",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48079"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72718",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72718"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1603",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48079",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48079"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72718",
"refsource": "OSVDB",
"url": "http://osvdb.org/72718"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1603",
"datePublished": "2011-06-02T20:00:00",
"dateReserved": "2011-04-05T00:00:00",
"dateUpdated": "2024-08-06T22:28:41.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0882 (GCVE-0-2002-0882)
Vulnerability from cvelistv5 – Published: 2002-08-31 04:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:49.262Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "4794",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4794"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4798",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4798"
},
{
"name": "cisco-ipphone-streamingstatistics-dos(9142)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"name": "cisco-ipphone-portinformation(9143)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9143.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "4794",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4794"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4798",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4798"
},
{
"name": "cisco-ipphone-streamingstatistics-dos(9142)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"name": "cisco-ipphone-portinformation(9143)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9143.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0882",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "4794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4794"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4798",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4798"
},
{
"name": "cisco-ipphone-streamingstatistics-dos(9142)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"name": "cisco-ipphone-portinformation(9143)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9143.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0882",
"datePublished": "2002-08-31T04:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:49.262Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0880 (GCVE-0-2002-0880)
Vulnerability from cvelistv5 – Published: 2002-08-31 04:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:48.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0880",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0880",
"datePublished": "2002-08-31T04:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:48.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0881 (GCVE-0-2002-0881)
Vulnerability from cvelistv5 – Published: 2002-08-31 04:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:49.268Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "cisco-ipphone-configuration-access(9144)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4799",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4799"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "cisco-ipphone-configuration-access(9144)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4799",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4799"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "cisco-ipphone-configuration-access(9144)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4799",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4799"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0881",
"datePublished": "2002-08-31T04:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:49.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-15434 (GCVE-0-2018-15434)
Vulnerability from nvd – Published: 2018-10-05 14:00 – Updated: 2024-11-26 14:26
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Unified IP Phone 7900 Series |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:54:03.598Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"name": "1041791",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041791"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-15434",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-25T18:47:43.085252Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-26T14:26:44.161Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Unified IP Phone 7900 Series",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-10-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-07T09:57:02",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"name": "1041791",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041791"
}
],
"source": {
"advisory": "cisco-sa-20181003-uipp-7900-xss",
"defect": [
[
"CSCvj73657"
]
],
"discovery": "UNKNOWN"
},
"title": "Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2018-10-03T16:00:00-0500",
"ID": "CVE-2018-15434",
"STATE": "PUBLIC",
"TITLE": "Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Unified IP Phone 7900 Series",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.1",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20181003 Cisco Unified IP Phone 7900 Series Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss"
},
{
"name": "1041791",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041791"
}
]
},
"source": {
"advisory": "cisco-sa-20181003-uipp-7900-xss",
"defect": [
[
"CSCvj73657"
]
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-15434",
"datePublished": "2018-10-05T14:00:00Z",
"dateReserved": "2018-08-17T00:00:00",
"dateUpdated": "2024-11-26T14:26:44.161Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5445 (GCVE-0-2012-5445)
Vulnerability from nvd – Published: 2012-12-28 11:00 – Updated: 2024-08-06 21:05
VLAI?
Summary
The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:05:47.223Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-07T10:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-5445",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The kernel in Cisco Native Unix (CNU) on Cisco Unified IP Phone 7900 series devices (aka TNP phones) with software before 9.3.1-ES10 does not properly validate unspecified system calls, which allows attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a crafted binary."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130109 Cisco Unified IP Phones Local Kernel System Call Input Validation Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone"
},
{
"name": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html",
"refsource": "MISC",
"url": "http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-5445",
"datePublished": "2012-12-28T11:00:00",
"dateReserved": "2012-10-17T00:00:00",
"dateUpdated": "2024-08-06T21:05:47.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1602 (GCVE-0-2011-1602)
Vulnerability from nvd – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:28:42.032Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "48074",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48074"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72717",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72717"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-07T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "48074",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48074"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72717",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72717"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1602",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "48074",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48074"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72717",
"refsource": "OSVDB",
"url": "http://osvdb.org/72717"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1602",
"datePublished": "2011-06-02T20:00:00",
"dateReserved": "2011-04-05T00:00:00",
"dateUpdated": "2024-08-06T22:28:42.032Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1637 (GCVE-0-2011-1637)
Vulnerability from nvd – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:37:24.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"refsource": "OSVDB",
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1637",
"datePublished": "2011-06-02T20:00:00",
"dateReserved": "2011-04-05T00:00:00",
"dateUpdated": "2024-08-06T22:37:24.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-1603 (GCVE-0-2011-1603)
Vulnerability from nvd – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:28:41.829Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48079",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48079"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72718",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72718"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-07T09:00:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48079",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48079"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72718",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72718"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1603",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 allow local users to gain privileges via unspecified vectors, aka Bug ID CSCtn65815."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48079",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48079"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "72718",
"refsource": "OSVDB",
"url": "http://osvdb.org/72718"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1603",
"datePublished": "2011-06-02T20:00:00",
"dateReserved": "2011-04-05T00:00:00",
"dateUpdated": "2024-08-06T22:28:41.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0882 (GCVE-0-2002-0882)
Vulnerability from nvd – Published: 2002-08-31 04:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:49.262Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "4794",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4794"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4798",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4798"
},
{
"name": "cisco-ipphone-streamingstatistics-dos(9142)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"name": "cisco-ipphone-portinformation(9143)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9143.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "4794",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4794"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4798",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4798"
},
{
"name": "cisco-ipphone-streamingstatistics-dos(9142)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"name": "cisco-ipphone-portinformation(9143)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9143.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0882",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web server for Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allows remote attackers to cause a denial of service (reset) and possibly read sensitive memory via a large integer value in (1) the stream ID of the StreamingStatistics script, or (2) the port ID of the PortInformation script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "4794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4794"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4798",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4798"
},
{
"name": "cisco-ipphone-streamingstatistics-dos(9142)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9142.php"
},
{
"name": "cisco-ipphone-portinformation(9143)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9143.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0882",
"datePublished": "2002-08-31T04:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:49.262Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0880 (GCVE-0-2002-0880)
Vulnerability from nvd – Published: 2002-08-31 04:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:48.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0880",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service (crash) via malformed packets as demonstrated by (1) \"jolt\", (2) \"jolt2\", (3) \"raped\", (4) \"hping2\", (5) \"bloop\", (6) \"bubonic\", (7) \"mutant\", (8) \"trash\", and (9) \"trash2.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0880",
"datePublished": "2002-08-31T04:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:48.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0881 (GCVE-0-2002-0881)
Vulnerability from nvd – Published: 2002-08-31 04:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:49.268Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "cisco-ipphone-configuration-access(9144)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4799",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4799"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "cisco-ipphone-configuration-access(9144)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4799",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4799"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020522 Multiple Vulnerabilities in CISCO VoIP Phones",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/273673"
},
{
"name": "cisco-ipphone-configuration-access(9144)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9144.php"
},
{
"name": "20020522 Multiple Vulnerabilities in Cisco IP Telephones",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/multiple-ip-phone-vulnerabilities-pub.shtml"
},
{
"name": "4799",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4799"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0881",
"datePublished": "2002-08-31T04:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:49.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}