var-201902-0450
Vulnerability from variot
A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones. CiscoSPA112Series and other products are products of Cisco. A certificate validation component exists in the certificate processing component of CiscoSPA112, SPA525, and SPA5X5Series. (TLS) Encrypted Session Initiation Protocol (SIP) call. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. This issue is being tracked by Cisco Bug ID CSCvm49157, CSCvn17125, CSCvn17128
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0450", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "spa525", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.2" }, { "model": "spa501g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa112", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa504g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa500", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa514g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa500s", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa500ds", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa508g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa5x5", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.6.2" }, { "model": "spa525g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa502g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa512g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "spa509g", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4.2" }, { "model": "small business spa500 series ip phone", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 112", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 500ds", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 500s", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 501g", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 502g", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 504g", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 508g", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 525", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa 5x5", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "spa5x5 series", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "spa112", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "spa525", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "small business voice gateways and atas", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.4.2" }, { "model": "small business spa500 series ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.2" }, { "model": "small business ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "BID", "id": "107111" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "NVD", "id": "CVE-2019-1683" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa112_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa525_firmware:7.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa5x5_firmware:7.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa5x5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa500_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa500s_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa500s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa500ds_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa500ds:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa501g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa501g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa502g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa502g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa504g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa504g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa508g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa508g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa509g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa509g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa512g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa512g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa514g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa514g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa525g_firmware:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa525g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1683" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco would like to thank Jan Dubov? for reporting this vulnerability.,Cisco ?? ??,Jan Dubov??", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-801" } ], "trust": 0.6 }, "cve": "CVE-2019-1683", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-1683", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2019-04936", "impactScore": 7.8, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-149015", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 4.2, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-1683", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1683", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1683", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-04936", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201902-801", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-149015", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "VULHUB", "id": "VHN-149015" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "NVD", "id": "CVE-2019-1683" }, { "db": "NVD", "id": "CVE-2019-1683" }, { "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones. CiscoSPA112Series and other products are products of Cisco. A certificate validation component exists in the certificate processing component of CiscoSPA112, SPA525, and SPA5X5Series. (TLS) Encrypted Session Initiation Protocol (SIP) call. \nSuccessfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCvm49157, CSCvn17125, CSCvn17128", "sources": [ { "db": "NVD", "id": "CVE-2019-1683" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "BID", "id": "107111" }, { "db": "VULHUB", "id": "VHN-149015" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1683", "trust": 3.4 }, { "db": "BID", "id": "107111", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-002108", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201902-801", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-04936", "trust": 0.6 }, { "db": "NSFOCUS", "id": "42804", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0538", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-149015", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "VULHUB", "id": "VHN-149015" }, { "db": "BID", "id": "107111" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "NVD", "id": "CVE-2019-1683" }, { "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "id": "VAR-201902-0450", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "VULHUB", "id": "VHN-149015" } ], "trust": 1.4738095333333332 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" } ] }, "last_update_date": "2023-12-18T13:08:12.447000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190220-ipphone-certs", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190220-ipphone-certs" }, { "title": "Patch for CiscoSPA112, SPA525, and SPA5X5Series Certificate Validation Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/154139" }, { "title": "Cisco SPA112 , SPA525 and SPA5X5 Series Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89595" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-149015" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "NVD", "id": "CVE-2019-1683" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190220-ipphone-certs" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/107111" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1683" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1683" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75898" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/42804" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-ip-phone-spax-privilege-escalation-via-certificate-validation-28574" }, { "trust": 0.3, "url": "http://www.cisco.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "VULHUB", "id": "VHN-149015" }, { "db": "BID", "id": "107111" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "NVD", "id": "CVE-2019-1683" }, { "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-04936" }, { "db": "VULHUB", "id": "VHN-149015" }, { "db": "BID", "id": "107111" }, { "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "db": "NVD", "id": "CVE-2019-1683" }, { "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2019-04936" }, { "date": "2019-02-25T00:00:00", "db": "VULHUB", "id": "VHN-149015" }, { "date": "2019-02-20T00:00:00", "db": "BID", "id": "107111" }, { "date": "2019-04-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "date": "2019-02-25T17:29:00.280000", "db": "NVD", "id": "CVE-2019-1683" }, { "date": "2019-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2019-04936" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-149015" }, { "date": "2019-02-20T00:00:00", "db": "BID", "id": "107111" }, { "date": "2019-04-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002108" }, { "date": "2023-03-23T17:34:03.533000", "db": "NVD", "id": "CVE-2019-1683" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-801" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-801" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco SPA Vulnerability related to certificate validation in series products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002108" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-801" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.