Description

A vulnerability in the directory permissions of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability exists because the product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. An attacker could exploit this vulnerability by sending a crafted packet to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information from the device. Note: To exploit this vulnerability, Web Access must be enabled on the phone. Web Access is disabled by default.

INFO

Published Date :

2025-09-03T17:41:01.463Z

Last Modified :

2025-09-03T17:57:31.207Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2025-20336 vulnerability.

Vendors Products
Cisco
  • Desk Phone 9841
  • Desk Phone 9841 Firmware
  • Desk Phone 9851
  • Desk Phone 9851 Firmware
  • Desk Phone 9861
  • Desk Phone 9861 Firmware
  • Desk Phone 9871
  • Desk Phone 9871 Firmware
  • Ip Phone 7800
  • Ip Phone 7811
  • Ip Phone 7811 Firmware
  • Ip Phone 7821
  • Ip Phone 7821 Firmware
  • Ip Phone 7841
  • Ip Phone 7841 Firmware
  • Ip Phone 7861
  • Ip Phone 7861 Firmware
  • Ip Phone 8800
  • Ip Phone 8811
  • Ip Phone 8811 Firmware
  • Ip Phone 8821
  • Ip Phone 8821 Firmware
  • Ip Phone 8841
  • Ip Phone 8841 Firmware
  • Ip Phone 8845
  • Ip Phone 8845 Firmware
  • Ip Phone 8851
  • Ip Phone 8851 Firmware
  • Ip Phone 8851nr
  • Ip Phone 8851nr Firmware
  • Ip Phone 8861
  • Ip Phone 8861 Firmware
  • Ip Phone 8865
  • Ip Phone 8865 Firmware
  • Ip Phone 9800
  • Session Initiation Protocol \(sip\) Firmware
  • Video Phone 8875
  • Video Phone 8875 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-20336.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact