var-201310-0516
Vulnerability from variot

The image-upgrade functionality on Cisco 9900 Unified IP phones allows local users to gain privileges by placing shell commands in an unspecified parameter, aka Bug ID CSCuh10334. Cisco 9900 Unified IP phones of image-upgrade There are vulnerabilities that can be used to obtain privileges. The vulnerability is due to insufficient filtering of input during the image upgrade process. An attacker can use the \";\" sign to inject shell commands and execute them. Successful exploits may compromise the affected device. This issue is being tracked by Cisco Bug ID CSCuh10334. This product provides voice and video functions

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0516",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "unified ip phones 9900 series",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "unified ip phone 9951",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "unified ip phone 9971",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "unified ip phone",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "9951"
      },
      {
        "model": "unified ip phone",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "9971"
      },
      {
        "model": "unified ip phone 9900 series",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "9.3.2 sr1"
      },
      {
        "model": "unified ip phones series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "9900"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phones_9900_series_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_9971:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_9951:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62943"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-5533",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.5,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-5533",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.5,
            "id": "CNVD-2013-13704",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.5,
            "id": "VHN-65535",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:H/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-5533",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13704",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201310-184",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-65535",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The image-upgrade functionality on Cisco 9900 Unified IP phones allows local users to gain privileges by placing shell commands in an unspecified parameter, aka Bug ID CSCuh10334. Cisco 9900 Unified IP phones of image-upgrade There are vulnerabilities that can be used to obtain privileges. The vulnerability is due to insufficient filtering of input during the image upgrade process. An attacker can use the \\\";\\\" sign to inject shell commands and execute them. Successful exploits may compromise the   affected device. \nThis issue is being tracked by Cisco Bug ID CSCuh10334. This product provides voice and video functions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "BID",
        "id": "62943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-5533",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "62943",
        "trust": 2.0
      },
      {
        "db": "OSVDB",
        "id": "98337",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20131010 CISCO UNIFIED IP PHONES 9900 SERIES IMAGE UPGRADE COMMAND INJECTION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "db": "BID",
        "id": "62943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "id": "VAR-201310-0516",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      }
    ],
    "trust": 0.06999999999999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:20:04.949000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Cisco Unified IP Phones 9900 Series Image Upgrade Command Injection Vulnerability",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5533"
      },
      {
        "title": "31214",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31214"
      },
      {
        "title": "Patch for the Cisco Unified IP Phones 9900 Series Firmware Upgrade Command Injection Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/40212"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5533"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/62943"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/98337"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5533"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5533"
      },
      {
        "trust": 0.6,
        "url": "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails\u0026bugid=cscuh10334"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "db": "BID",
        "id": "62943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "db": "BID",
        "id": "62943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-10-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "date": "2013-10-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "date": "2013-10-10T00:00:00",
        "db": "BID",
        "id": "62943"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "date": "2013-10-11T03:54:53.830000",
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-10-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13704"
      },
      {
        "date": "2016-09-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-65535"
      },
      {
        "date": "2013-10-16T00:54:00",
        "db": "BID",
        "id": "62943"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      },
      {
        "date": "2016-09-22T17:46:50.037000",
        "db": "NVD",
        "id": "CVE-2013-5533"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "62943"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco 9900 Unified IP phones of  image-upgrade Vulnerabilities that can be authorized for functions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-004603"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-184"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.