CVE-2019-1683
Published Feb 25, 2019
Last updated 2 years ago
Overview
- Description
- A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 5.2
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 4.2
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa112_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "446DB55D-F434-4258-9E5C-916F6D50FEAA" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F61B8649-0781-4AF5-8CED-34616A9524FF" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa525_firmware:7.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CDD2C6F-AE4E-406B-B20C-5D4CAE27E5B1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa525:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "452622A5-5A5A-40F2-AD69-4158FEA1309E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa5x5_firmware:7.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D45DCC7-38DC-4D31-B5C7-40CB1A509561" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa5x5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43DA3CED-C668-4B88-BB40-EA606D42A886" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa500_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CE3C21C-30A2-4CE0-A3A7-C31D48675138" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E4106574-86FB-4B35-AD82-0E553CDC222D" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa500s_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0E6510C-DA29-40CA-A818-CCA6A6E99B6D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa500s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "66B2A148-467A-4F10-945C-1F49A218BD4F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa500ds_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "238CDC0D-55D3-4DC1-9AEB-132FA0955CC3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa500ds:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9C7B9304-CCA9-41C0-A6B9-032DC923420C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa501g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95EDA2CC-0795-46B2-8028-8F126C478D6D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa501g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "73B67905-79ED-4771-B436-49868BA7C922" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa502g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C76137F-AAF4-43E0-8325-628F3040F7C8" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa502g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D371387F-C7CC-46BB-85E9-419EF97D2A00" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa504g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81249DC5-3F5E-4F6F-8025-0C13DEE5B696" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa504g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D3FE12AB-1CC7-450D-88F2-7B06C51DCE7C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa508g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C27CF16B-9904-4333-989F-93CD89FF6853" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa508g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F38FDFF1-AD9D-40E1-A232-4B08AE0C4ABC" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa509g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A842DD1E-EEE7-4F35-811F-E5E09326B8E8" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa509g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7C04DA66-1516-40ED-B8AC-504F8B2B1E88" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa512g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C838D5C8-D724-4C8C-86FC-961759D3FC99" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa512g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92A92FEE-7CB5-43B1-8AC3-00C077DD4A63" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa514g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9856BB19-C195-4917-8152-EB2CBBBAFC99" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa514g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16C4089F-5B9F-4D69-8819-43B52309454F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa525g_firmware:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF7A2D2C-8C78-4616-8DFB-5B17C7974AA1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa525g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B5602EAB-6507-4B5B-A05B-4FED970B43D0" } ], "operator": "OR" } ], "operator": "AND" } ]