FKIE_CVE-2021-1379

Vulnerability from fkie_nvd - Published: 2024-11-18 16:15 - Updated: 2026-01-06 17:30
Summary
Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone. These vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Impacted products
Vendor Product Version
cisco ip_conference_phone_7832_firmware *
cisco ip_conference_phone_7832_firmware 12.8\(1\)
cisco ip_conference_phone_7832_with_multiplatform_firmware *
cisco ip_conference_phone_7832 -
cisco ip_conference_phone_8832_firmware *
cisco ip_conference_phone_8832_firmware 12.8\(1\)
cisco ip_conference_phone_8832_with_multiplatform_firmware *
cisco ip_conference_phone_8832 -
cisco ip_phone_6821_with_multiplatform_firmware *
cisco ip_phone_6821 -
cisco ip_phone_6841_with_multiplatform_firmware *
cisco ip_phone_6841 -
cisco ip_phone_6851_with_multiplatform_firmware *
cisco ip_phone_6851 -
cisco ip_phone_6861_with_multiplatform_firmware *
cisco ip_phone_6861 -
cisco ip_phone_6871_with_multiplatform_firmware *
cisco ip_phone_6871 -
cisco ip_phone_7811_firmware *
cisco ip_phone_7811_firmware 12.8\(1\)
cisco ip_phone_7811_with_multiplatform_firmware *
cisco ip_phone_7811 -
cisco ip_phone_7821_firmware *
cisco ip_phone_7821_firmware 12.8\(1\)
cisco ip_phone_7821_with_multiplatform_firmware *
cisco ip_phone_7821 -
cisco ip_phone_7841_firmware *
cisco ip_phone_7841_firmware 12.8\(1\)
cisco ip_phone_7841_with_multiplatform_firmware *
cisco ip_phone_7841 -
cisco ip_phone_7861_firmware *
cisco ip_phone_7861_firmware 12.8\(1\)
cisco ip_phone_7861_with_multiplatform_firmware *
cisco ip_phone_7861 -
cisco ip_phone_8811_firmware *
cisco ip_phone_8811_firmware 12.8\(1\)
cisco ip_phone_8811_with_multiplatform_firmware *
cisco ip_phone_8811 -
cisco ip_phone_8841_firmware *
cisco ip_phone_8841_firmware 12.8\(1\)
cisco ip_phone_8841_with_multiplatform_firmware *
cisco ip_phone_8841 -
cisco ip_phone_8851_firmware *
cisco ip_phone_8851_firmware 12.8\(1\)
cisco ip_phone_8851_with_multiplatform_firmware *
cisco ip_phone_8851 -
cisco ip_phone_8861_firmware *
cisco ip_phone_8861_firmware 12.8\(1\)
cisco ip_phone_8861_with_multiplatform_firmware *
cisco ip_phone_8861 -
cisco ip_phone_8845_firmware *
cisco ip_phone_8845_firmware 12.8\(1\)
cisco ip_phone_8845_with_multiplatform_firmware *
cisco ip_phone_8845 -
cisco ip_phone_8865_firmware *
cisco ip_phone_8865_firmware 12.8\(1\)
cisco ip_phone_8865_with_multiplatform_firmware *
cisco ip_phone_8865 -
cisco unified_ip_conference_phone_8831_firmware *
cisco unified_ip_conference_phone_8831_firmware 10.3\(1\)
cisco unified_ip_conference_phone_8831_firmware 10.3\(1\)
cisco unified_ip_conference_phone_8831_firmware 10.3\(1\)
cisco unified_ip_conference_phone_8831_firmware 10.3\(1\)
cisco unified_ip_conference_phone_8831_firmware 10.3\(1\)
cisco unified_ip_conference_phone_8831_firmware 10.3\(1\)
cisco unified_ip_conference_phone_8831_for_third-party_call_control_firmware -
cisco unified_ip_conference_phone_8831 -
cisco wireless_ip_phone_8821_firmware *
cisco wireless_ip_phone_8821 -
cisco wireless_ip_phone_8821-ex_firmware *
cisco wireless_ip_phone_8821-ex -
cisco spa525g_firmware -
cisco spa525g -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85169CA5-F2A3-4042-9B5D-2B7CB3099A20",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "BCE9E23B-9337-42B4-BF3E-7D712379344C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DB6C05-E88E-44DA-B384-472484748C76",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6592E7FE-346E-4923-97C2-F5298DC802A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF507C75-370E-4BDE-B0E7-E480DB86529F",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "E2E78330-0EE4-4618-AAA4-7CA9F482C46D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F68A09-5FF4-4566-BE33-F23AF52F5382",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1010D16-DC6E-47A6-8BF9-C1026D975E3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737560A3-92CE-4772-BFA7-3554799BA570",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEFD67F1-8FB1-4F27-8B97-59DF78DE41A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13427609-C101-4C80-8FEE-4A1A4CB99C2F",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4960B1-22B4-4B3D-955E-684DA520A1A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36236BFC-B4C0-47EA-BB0F-F85974DF88A6",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5809CA01-CF32-4E3A-A771-01D5065F0061",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEA92B7-2088-4113-910C-3A7517E4E575",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A850D5B2-6F08-4B31-B1BD-C19CB292390B",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "864B486C-71F6-4EFD-8F04-BA7FC18DFD5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C06A12-DA6B-4D5A-9E30-2C922EB3EB4D",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7811_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "47018F64-A22E-49B4-9A4C-C98F83334035",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67364D7B-3027-49FB-A602-8181182CB208",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7260C17-7067-47AD-995F-366A5E8B10E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C6A3CB0-BD14-41EB-86E9-EA7AAAD76BBE",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7821_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "FCF0ABB0-9A86-4ABF-BEFD-660D61DCAC3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A75A5F-3BCF-4566-AEE5-2FBD336578AC",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0804577-E371-440E-BF96-F83336562719",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7841_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "DAE9F876-28DC-4A67-B248-D28DCB9AC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA7D8F2-036D-4BE6-852D-93F1489AC85D",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C62D5BC-9F4F-4351-B7F8-0471D077E862",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7861_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "7DEEB93F-A774-4FAC-8415-E6B5E17BE8E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB427B3-43D4-492A-A617-0F178DE797FF",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52C420C-FD54-4BE4-8720-E05307D53520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "892EDF71-710B-48D5-9893-95CB1CB9E9C0",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8811_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "1413D748-8DE4-4FC2-B433-219E25C370AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D1C0ED-E653-4FC1-898A-C1EC011856B6",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CC3127-3152-4906-9FE0-BC6F21DCADAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32105BC1-5E87-484B-801D-5804DB74863F",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8841_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "02343D84-098F-4869-86DD-531083D65BF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3367A2-BFD6-4A24-8DC7-CEF633CD183C",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7944CC9C-AE08-4F30-AF65-134DADBD0FA1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DFDAC7-9E51-4537-A047-89C4979B6AD0",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "296DFB8C-7843-417F-8FA5-064FEAD371AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9C78A8-5227-4AA8-BA3C-284A746CC190",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF6DC5E-F582-445E-BF05-2D55A0954663",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C9E1E28-34C1-4D5A-BAA4-9034014170CC",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "7DD8E232-3DA7-4DEE-8F0A-266AF71D804A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60731995-FAAF-414F-925E-F6CF88870528",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "379B3A45-200D-46E0-BDF9-BDA931E21D85",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8845_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "F6D2B24A-D162-43EF-B6AF-5CF4A3E66DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "753C0E23-B5E9-4186-BA2D-528D5535DCC2",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A313E64A-F43C-4FBA-A389-6171CBD709C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E97226-CF8D-4DB9-839D-ACFAD7A9812D",
              "versionEndExcluding": "12.8\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:12.8\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "70463F17-C138-4636-BDDB-4FB5AE991B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "728FEB7E-770A-47E7-A9F9-CF7FBBF37633",
              "versionEndExcluding": "11.3\\(2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43706089-CA79-4D60-9AA8-9E24556699EA",
              "versionEndExcluding": "10.3\\(1\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3\\(1\\):-:*:*:*:*:*:*",
              "matchCriteriaId": "61315697-3308-4D5F-815E-3D52B8FC9452",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3\\(1\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "83A4AD5A-D469-4409-9304-D5D0E41A2F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3\\(1\\):sr2:*:*:*:*:*:*",
              "matchCriteriaId": "1E7E092B-161C-4470-9CDB-D1572C5803E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3\\(1\\):sr3:*:*:*:*:*:*",
              "matchCriteriaId": "B386A090-0804-4AE3-8EBF-7AAC69703381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3\\(1\\):sr4b:*:*:*:*:*:*",
              "matchCriteriaId": "5045A77F-D2AD-4825-8FB5-8FFE0B33D8A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3\\(1\\):sr6:*:*:*:*:*:*",
              "matchCriteriaId": "DEB306F3-4F31-428C-BDAA-FA407577A53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_ip_conference_phone_8831_for_third-party_call_control_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5699693-DBEC-429F-B67E-0B1625818FAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "660475FD-8475-4968-9ED2-D83461B9A5D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27017F70-3FE8-4027-98AE-78291BBEAA34",
              "versionEndExcluding": "11.0\\(6.6\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F97DF354-7690-417E-B223-72C8BDA36DA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A387D7D-999D-4EA1-B878-9551893FA843",
              "versionEndExcluding": "11.0\\(6.6\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:spa525g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1668FAAF-CFC0-4C42-B1A3-0649BD1CBCFD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:spa525g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5602EAB-6507-4B5B-A05B-4FED970B43D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple vulnerabilities in the Cisco\u0026nbsp;Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco\u0026nbsp;IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone.\r\nThese vulnerabilities are due to missing checks when the IP phone processes a Cisco\u0026nbsp;Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco\u0026nbsp;Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco\u0026nbsp;Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco\u0026nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
    },
    {
      "lang": "es",
      "value": "Varias vulnerabilidades en las implementaciones de Cisco Discovery Protocol y Link Layer Discovery Protocol (LLDP) para los tel\u00e9fonos IP de Cisco de las series 68xx/78xx/88xx podr\u00edan permitir que un atacante adyacente no autenticado ejecute c\u00f3digo de forma remota o provoque una recarga de un tel\u00e9fono IP afectado. Estas vulnerabilidades se deben a la falta de comprobaciones cuando el tel\u00e9fono IP procesa un paquete Cisco Discovery Protocol o LLDP. Un atacante podr\u00eda explotar estas vulnerabilidades enviando un paquete Cisco Discovery Protocol o LLDP malicioso al tel\u00e9fono IP de destino. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo en el tel\u00e9fono IP afectado o hacer que se recargue inesperadamente, lo que resultar\u00eda en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Nota: Cisco Discovery Protocol es un protocolo de capa 2. Para explotar estas vulnerabilidades, un atacante debe estar en el mismo dominio de difusi\u00f3n que el dispositivo afectado (adyacente a la capa 2). Cisco ha publicado actualizaciones de software que solucionan estas vulnerabilidades. No existen workarounds que solucionen estas vulnerabilidades."
    }
  ],
  "id": "CVE-2021-1379",
  "lastModified": "2026-01-06T17:30:36.293",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-18T16:15:09.310",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…