SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (VoIP/Phone/FAX)  >   Cisco IP Phones Vendors:   Cisco
Cisco SPA30X, SPA50X, and SPA51X Series IP Phones File Integrity Check Flaw Lets Local Users Load Arbitrary Firmware Images
SecurityTracker Alert ID:  1034376
SecurityTracker URL:  http://securitytracker.com/id/1034376
CVE Reference:   CVE-2015-6403   (Links to External Site)
Date:  Dec 10 2015
Impact:   Modification of system information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): SPA30X, SPA50X, and SPA51X Series
Description:   A vulnerability was reported in Cisco SPA30X, SPA50X, and SPA51X Series IP Phones. A local user can obtain elevated privileges on the target system.

A local user can exploit a file integrity check flaw in the TFTP implementation to load arbitrary firmware images on the target system.

The Cisco SPA30X, SPA50X, and SPA51X Series IP Phones are affected.

The vendor has assigned bug ID CSCut67400 to this vulnerability.

Chris Watts reported this vulnerability.

Impact:   A local user can load arbitrary firmware images on the target system.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC