Description

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper storage of sensitive information within the web UI of Session Initiation Protocol (SIP)-based phone loads. An attacker could exploit this vulnerability by browsing to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information, including incoming and outgoing call records. Note: Web Access is disabled by default.

INFO

Published Date :

2024-11-06T16:29:06.293Z

Last Modified :

2024-11-06T22:00:02.234Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2024-20445 vulnerability.

Vendors Products
Cisco
  • Desk Phone 9841
  • Desk Phone 9841 Firmware
  • Desk Phone 9851
  • Desk Phone 9851 Firmware
  • Desk Phone 9861
  • Desk Phone 9861 Firmware
  • Desk Phone 9871
  • Desk Phone 9871 Firmware
  • Ip Conference Phone 7832
  • Ip Conference Phone 7832 Firmware
  • Ip Conference Phone 8831
  • Ip Conference Phone 8831 Firmware
  • Ip Conference Phone 8832
  • Ip Conference Phone 8832 Firmware
  • Ip Phone 7811
  • Ip Phone 7811 Firmware
  • Ip Phone 7821
  • Ip Phone 7821 Firmware
  • Ip Phone 7841
  • Ip Phone 7841 Firmware
  • Ip Phone 7861
  • Ip Phone 7861 Firmware
  • Ip Phone 8811
  • Ip Phone 8811 Firmware
  • Ip Phone 8841
  • Ip Phone 8841 Firmware
  • Ip Phone 8845
  • Ip Phone 8845 Firmware
  • Ip Phone 8851
  • Ip Phone 8851 Firmware
  • Ip Phone 8851nr
  • Ip Phone 8851nr Firmware
  • Ip Phone 8861
  • Ip Phone 8861 Firmware
  • Sip Ip Phone Software
  • Video Phone 8875
  • Video Phone 8875 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-20445.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact