var-200702-0464
Vulnerability from variot

The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device. Cisco Unified IP Conference Station and Unified IP Phone are prone to multiple remote vulnerabilities. These issues include an administrative-bypass issue, an unauthorized-access issue, and a privilege-escalation issue. An attacker can exploit these issues to completely compromise affected devices. The attacker may be able to gain administrative access to the affected device, execute arbitrary code with administrative privileges, or cause the device to become unstable, denying service to legitimate users. The SSH server in many Cisco products has a trust management vulnerability. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components.


Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

1) A design error in way the administrative HTTP interface of Cisco Unified IP Conference Station handles the state of administrator login sessions can be exploited to bypass the user authentication by accessing management URLs directly. This can further be exploited to cause a DoS (Denial of Service) or gain escalated privileges.

SOLUTION: Update to a fixed version (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Christian Reichert, Christian Blum, and Jens Link of Intact Integrated Services. 2) Reported by the vendor.

ORIGINAL ADVISORY: Cisco Systems: http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0464",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "unified ip phone 7961g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7911g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7971g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7906g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7941g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7970g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "unified ip phone 7911g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7941g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7961g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7970g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7906g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip phone 7971g",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "firmware 8.0(4)sr1"
      },
      {
        "model": "unified ip conference station 7936",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.2\\(15\\)"
      },
      {
        "model": "unified ip conference station 7935",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.2\\(15\\)"
      },
      {
        "model": "skinny client control protocol software",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "8.0\\(4\\)"
      },
      {
        "model": "skinny client control protocol software",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.2\\(15\\)"
      },
      {
        "model": "unified ip phone 8.0 sr1",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip phone 7970g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip phone 7961g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip phone 7941g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip phone 7911g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip phone 7906g",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip conference station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7936"
      },
      {
        "model": "unified ip conference station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7935"
      },
      {
        "model": "unified ip conference station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3(12)"
      },
      {
        "model": "unified ip conference station",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2(15)"
      },
      {
        "model": "unified ip phone",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "8.2(1)"
      },
      {
        "model": "unified ip phone 8.0 sr2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip conference station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3(13)"
      },
      {
        "model": "unified ip conference station",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2(16)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22647"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7906g:8.0\\(4\\):sr1:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7911g:8.0\\(4\\):sr1:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7941g:8.0\\(4\\):sr1:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7961g:8.0\\(4\\):sr1:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7970g:8.0\\(4\\):sr1:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7970g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7971g:8.0\\(4\\):sr1:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7971g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Christian Reichert\r\nChristian Blum\r\nJens Link,Christian Reichert\r\nChristian Blum\r\nJens Link",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-1063",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2007-1063",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-24425",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-1063",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200702-358",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24425",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device. Cisco Unified IP Conference Station and Unified IP Phone are prone to multiple remote vulnerabilities. These issues include an administrative-bypass issue, an unauthorized-access issue, and a privilege-escalation issue. \nAn attacker can exploit these issues to completely compromise affected devices. The attacker may be able to gain administrative access to the affected device, execute arbitrary code with administrative privileges, or cause the device to become unstable, denying service to legitimate users. The SSH server in many Cisco products has a trust management vulnerability. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\n1) A design error in way the administrative HTTP interface of Cisco\nUnified IP Conference Station handles the state of administrator\nlogin sessions can be exploited to bypass the user authentication by\naccessing management URLs directly. This can further be exploited to cause a DoS\n(Denial of Service) or gain escalated privileges. \n\nSOLUTION:\nUpdate to a fixed version (see the vendor\u0027s advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Christian Reichert, Christian Blum, and Jens\nLink of Intact Integrated Services. \n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nCisco Systems:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml\nhttp://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "db": "BID",
        "id": "22647"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1063",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "22647",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "24262",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1017681",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0689",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "45246",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-24425",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54564",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "db": "BID",
        "id": "22647"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "id": "VAR-200702-0464",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:46:50.448000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20070221-phone",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20070221-phone"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-798",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml"
      },
      {
        "trust": 1.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/22647"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/45246"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1017681"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24262"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2007/0689"
      },
      {
        "trust": 1.7,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32627"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1063"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1063"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/hw/phones/ps379/ps5476/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/hw/phones/ps379/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/460752"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13540/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24262/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13541/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13543/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "db": "BID",
        "id": "22647"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "db": "BID",
        "id": "22647"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-02-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "date": "2007-02-21T00:00:00",
        "db": "BID",
        "id": "22647"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "date": "2007-02-23T02:32:16",
        "db": "PACKETSTORM",
        "id": "54564"
      },
      {
        "date": "2007-02-22T01:28:00",
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "date": "2007-02-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24425"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "22647"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      },
      {
        "date": "2019-05-23T16:15:42.703000",
        "db": "NVD",
        "id": "CVE-2007-1063"
      },
      {
        "date": "2019-05-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SSH server in Cisco Unified IP Phone Device access vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001598"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-358"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.