Cisco Unified IP Phone 9900 9.3(4.24) HTTP Request input validation

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as critical has been discovered in Cisco Unified IP Phone 9900 9.3(4.24). This vulnerability affects unknown code of the component HTTP Request Handler. Executing a manipulation can lead to input validation. This vulnerability appears as CVE-2015-0604. There is no available exploit. It is advisable to upgrade the affected component.
Details
A vulnerability was found in Cisco Unified IP Phone 9900 9.3(4.24) (IP Phone Software). It has been declared as critical. This vulnerability affects an unknown functionality of the component HTTP Request Handler. The manipulation with an unknown input leads to a input validation vulnerability. The CWE definition for the vulnerability is CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. As an impact it is known to affect integrity. CVE summarizes:
The web framework on Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier allows remote attackers to upload files to arbitrary locations on a phone s filesystem via crafted HTTP requests, aka Bug ID CSCup90424.
The weakness was presented 02/03/2015 with Cisco as CSCup90424 as confirmed security notice (Website). The advisory is shared for download at tools.cisco.com. This vulnerability was named CVE-2015-0604 since 01/07/2015. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (100620), SecurityFocus (BID 72485†), Secunia (SA62761†) and Vulnerability Center (SBV-48793†). Additional details are provided at tools.cisco.com. See VDB-69027 and VDB-69026 for similar entries. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
01/07/2015 🔍02/03/2015 🔍
02/03/2015 🔍
02/04/2015 🔍
02/05/2015 🔍
02/06/2015 🔍
02/25/2015 🔍
06/21/2017 🔍
Sources
Vendor: cisco.comAdvisory: CSCup90424
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2015-0604 (🔍)
GCVE (CVE): GCVE-0-2015-0604
GCVE (VulDB): GCVE-100-69028
X-Force: 100620 - Cisco Unified IP Phones 9900 Series file upload, Medium Risk
SecurityFocus: 72485 - Cisco Unified IP Phones 9900 Series CVE-2015-0604 Arbitrary File Upload Vulnerability
Secunia: 62761
Vulnerability Center: 48793 - Cisco Unified IP 9900 Remote File System Write via Crafted HTTP Requests, Medium
Misc.: 🔍
See also: 🔍
Entry
Created: 02/05/2015 10:57Updated: 06/21/2017 10:51
Changes: 02/05/2015 10:57 (63), 06/21/2017 10:51 (5)
Complete: 🔍
Cache ID: 216:CCC:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.