CVE-2007-1063
Published Feb 22, 2007
Last updated 5 years ago
Overview
- Description
- The SSH server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier, uses a hard-coded username and password, which allows remote attackers to access the device.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-798
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7906g:8.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23432284-A61D-4154-8F12-0BDD5CD5626C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "94B18568-30F5-40BF-96DB-589ED8D960F5" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7911g:8.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A79FC2D2-ADA6-40E7-B4BE-2D88EDAC3542" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0BF164BA-91F9-434B-9837-1B6E600A91AF" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7941g:8.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F81336D-8BDD-48F4-AC57-65FF6977C4B6" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E7519FF0-672E-430F-980D-53D2A851C78C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7961g:8.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CBAB656-95DD-4F06-ABA9-F0440D100B66" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C1B979DC-52B4-497E-9D7C-3D8F861E6E26" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7970g:8.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9F28146-B268-4B3F-A399-19CC422EBAB0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "832C16DC-ED55-4879-8CF4-610BDDDAB86F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_ip_phone_firmware_7971g:8.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C8D7BE-0997-47E8-80A3-1F6263B66B91" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5C0ED520-140A-43C4-99F0-751C358F8CDE" } ], "operator": "OR" } ], "operator": "AND" } ]