CVE-2015-0670
Published Mar 21, 2015
Last updated 9 years ago
Overview
- Description
- The default configuration of Cisco Small Business IP phones SPA 300 7.5.5 and SPA 500 7.5.5 does not properly support authentication, which allows remote attackers to read audio-stream data or originate telephone calls via a crafted XML request, aka Bug ID CSCuo52482.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa500_firmware:7.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8727431B-65BF-4325-971B-4E9E63C32A2D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa_501g_8-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "527E6A1C-A9AE-4AF3-8507-AC2A03924E7E" }, { "criteria": "cpe:2.3:h:cisco:spa_502g_1-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD470FF7-2536-4438-8ABD-96CB2C3E75E5" }, { "criteria": "cpe:2.3:h:cisco:spa_504g_4-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84F14F35-FB94-4EC7-B50C-2CA6DD03A703" }, { "criteria": "cpe:2.3:h:cisco:spa_508g_8-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FA06FAB-9D59-40AD-8888-767D48B2DBCF" }, { "criteria": "cpe:2.3:h:cisco:spa_509g_12-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F797658-737B-445F-AF43-E591231F1A64" }, { "criteria": "cpe:2.3:h:cisco:spa_512g_1-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71D77638-F36D-4FE7-871F-DB985DD82130" }, { "criteria": "cpe:2.3:h:cisco:spa_514g_4-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A68F5658-F1EE-4AA5-A7E5-4FEAA73C0DA0" }, { "criteria": "cpe:2.3:h:cisco:spa_525g_5-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEDD2219-75C0-4E70-9A32-761CAB513C4F" }, { "criteria": "cpe:2.3:h:cisco:spa_525g2_5-line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CC94EC7-F454-4FAD-9E40-474A4D416F60" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa300_firmware:7.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B336B330-27D1-4BEB-B72F-A169DA69C445" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa_301_1_line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0730B450-BC83-4624-9F0C-4DBDB8EC2270" }, { "criteria": "cpe:2.3:h:cisco:spa_302d:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01339E9E-5A90-4476-BE6D-48D42721631F" }, { "criteria": "cpe:2.3:h:cisco:spa_302dkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0BB1176-83A0-44B8-9136-CCADA407C12B" }, { "criteria": "cpe:2.3:h:cisco:spa_303_3_line_ip_phone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF3EB07A-B4FB-4649-B8EF-10E642454126" } ], "operator": "OR" } ], "operator": "AND" } ]