SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (VoIP/Phone/FAX)  >   Cisco IP Phones Vendors:   Cisco
Cisco SPA300/SPA500 Series IP Phones Access Control Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks
SecurityTracker Alert ID:  1039621
SecurityTracker URL:  http://securitytracker.com/id/1039621
CVE Reference:   CVE-2017-12271   (Links to External Site)
Date:  Oct 18 2017
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): SPA300 and SPA500 series
Description:   A vulnerability was reported in Cisco SPA300/SPA500 Series IP Phones. A remote user can conduct cross-site request forgery attacks.

A remote user can create a specially crafted HTML page or URL that, when loaded by the target authenticated user, will take actions on the target interface acting as the target user.

The vendor has assigned bug IDs CSCuz88421, CSCuz91356, and CSCve56308 to this vulnerability.

Chris Watts of Tech Analysis reported this vulnerability.

Impact:   A remote user can take actions on the target system acting as the target authenticated user.
Solution:   The vendor has issued a fix (7.6(2)SR3).

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-spa

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-spa (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-spa

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC