Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (VoIP/Phone/FAX)  >   Cisco IP Phones Vendors:   Cisco
Cisco Unified Wireless IP Phone 7921 Does Not Validate Sever Certificates When Using PEAP
SecurityTracker Alert ID:  1019494
SecurityTracker URL:
CVE Reference:   CVE-2008-1113   (Links to External Site)
Updated:  Mar 19 2008
Original Entry Date:  Feb 25 2008
Impact:   Host/resource access via network
Vendor Confirmed:  Yes  
Version(s): Model 7921
Description:   A vulnerability was reported in Cisco Unified Wireless IP Phone model 7921. A remote user can determine the installation path.

When configured to use Protected Extensible Authentication Protocol (PEAP), the phone does not validate server certificates.

A remote user may be able to conduct a man-in-the-middle attack.

The original advisory is available at:

George Ou reported this vulnerability.

Impact:   The device does not validate server certificates.
Solution:   No solution was available at the time of this entry.

The vendor plans to issue a fix.

Cisco recommends, as a workaround, using EAP-TLS as an alternative.

Vendor URL: (Links to External Site)
Cause:   Authentication error

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] Cisco confirms vulnerability in 7921 Wi-Fi IP

Two days after news of the Vocera Wi-Fi VoIP communicator PEAP security
bypass vulnerability, I received confirmation from Cisco that their
7921 Wi-Fi VoIP phone is also vulnerable to the same issue where digital
certificates aren't cryptographically verified.  Both Cisco and Vocera
have told me that they intend to fix future implementations of PEAP and
do the necessary steps to ensure certificate authenticity.  Cisco
released the following statement.

"Cisco confirms that the Cisco wireless IP phone model 7921 does not
currently validate server certificates when configured to use PEAP
(MS-CHAPv2). The Cisco 7920 model does not support PEAP. Cisco is
planning a long term solution to enable the option of client-side
validation of server certificates with PEAP; however, we do not
currently have a time line for when a software upgrade will be
available. To work around the problem, administrators can configure
EAP-TLS as an alternative to PEAP while ensuring mutual client-server

Details at

George Ou, CISSP
ZDNet Editor at Large (CNET Networks)

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC